Target Privacy Data Breach: Part 2
Target Retailers were just involved in the second largest credit card data breach in United States history. Today Target announced the data breach that occurred over Thanksgiving weekend now exposes...
View ArticleMobile Security: Why Should I Care?
Mobile security is top of mind when it comes to concerns for IT Managers. According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile...
View ArticleAvoiding Pitfalls to Cloud Computing Migration
It seems a majority of companies are adopting Cloud Computing as a significant portion of their IT infrastructure. According the Computing Technology Industry Association (CompTIA) 4th Annual Trends...
View ArticleWhy You Need a Bullet Proof Computer Network
Your Computer Network is the information pipeline of your business. But what if your network goes down? If your computer network is not operating properly, you may lose access to critical applications...
View ArticleWill Smartphones and Tablets Kill the PC?
With Windows XP support ending soon for millions of PCs, many companies are considering a variety of replacement strategies. The adoption of smartphones and tablets is clearly on the rise. According...
View ArticleMobile Security: Does Your SmartPhone need a Kill Switch?
Many Smartphones and Tablet computers have access to corporate applications and their data through Bring Your Own Device (BYOD) policies and corporate-sponsored mobility strategies. Mobile Security...
View ArticleHeartbleed Bug: What a Business Owner Should Know
The name Heartbleed OpenSSL Vulnerability (aka Heartbleed bug) is as scary as it sounds. Some reports say up to two thirds of all secure websites (e.g. those with a web address starting with a green...
View ArticleAvoiding Downtime by Having a Business Continuity Plan
Companies small and large are increasingly reliant on their IT systems and infrastructure. Having a Business Continuity plan is a proactive way of avoiding unnecessary downtime due to a disaster, human...
View Article5 Things You Need to Know about Privacy Breach Notifications
Recent high-profile data breaches, such as those that occurred at Neiman Marcus and Target, have brought privacy breach notification laws into public debate. In the event that your company’s secure...
View ArticleIs Your Network Ready for Cloud Computing?
Cloud-based based computing adoption is increasing among many businesses. According to the Computing Technology Industry Association (CompTIA) Annual trends in Cloud Computing study, 60% of business...
View Article
More Pages to Explore .....