Questions? Contact Us

 

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your m...
Continue reading
2363 Hits
0 Comments

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their "Insider Threat 2018 Report." The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by "insiders" – the employees and partners that have access to an organization's business operating systems and data. The report reminds us tha...
Continue reading
1009 Hits
0 Comments

Three Ways to Improve the Security and Reduce the Cost of Password Resets

Using passwords as a primary means of authentication for account logins is not going away soon. Despite the work being done to bring in other authentication mechanisms, passwords are here to stay – at least for the near future.We don't use passwords because they're the most secure option today; we use them because they're convenient and cheap compa...
Continue reading
879 Hits
0 Comments

What’s on your cyber security checklist?

If you're using October – National Cyber Security Awareness Month – to take a hard look at your security practices, policies, procedures and systems, we'd like to offer a starting point for a security checklist, examining some of the key considerations from a people, process and technology viewpoint.People: Disgruntled or uninformed employees are o...
Continue reading
1036 Hits
0 Comments

Hosting in a secure environment is necessary for all businesses

Hosting in a secure environment is necessary for all businesses
​In today's online-driven world, it's not a matter of if, but when a business will a victim of a cyber-attack.The threat of a data breach has become so imminent that an entirely branch of insurance products (cyber liability and privacy policies) have exist specifically to cover a business' liability in the event a hacker steals or exposes sensitive...
Continue reading
1910 Hits
0 Comments