information security

Five security mistakes and how to prevent them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security specialist RSA in 2011) to payment card information (Home Depot in 2014). And they’re becoming more complex and lethal, according to the recently released 2017 Verizon Data Breach Digest.

Five security mistakes and how to prevent them Read More »

Minority report: Pre-crime technology has arrived

Remember the movie Minority Report, where advanced analytics and supercomputing was able to predict where the next crime would take place and a special police unit was able to arrest murderers before they committed their crime? Well, that technology is not just for Hollywood anymore. Pre-crime technologies are already here The following pre-crime technologies already

Minority report: Pre-crime technology has arrived Read More »

4 new CRMs your sales team should be looking at

Customer relationship management (CRM) refers to the practices, strategies, and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers, assisting in customer retention, and driving sales growth. CRM systems are designed to compile information on customers across different channels,

4 new CRMs your sales team should be looking at Read More »

Why you should work for a company that cares about information security

Not a month goes by these days without hearing in the news about a high-profile hack attack of a major national brand. As an employee why should you care about working for a company that invests in information security? Information is the heart of any organization, and yet each year, companies stand to lose millions

Why you should work for a company that cares about information security Read More »

Enhance your infosec through end-user training

Your organization’s security is only as strong as its weakest link: your end-users. Therefore, it is imperative to prioritize end-user training at the organization level. A striking example of the consequences of overlooking employee training emerged in May 2022 when Yahoo’s senior research scientist, Qian Sang, gained unauthorized access to confidential information related to Yahoo’s

Enhance your infosec through end-user training Read More »

RSA 2016: Strategic risk management for the security-savvy enterprise

Author:  Bar Lockwood, CISA, CISM Compared to last year’s doom and gloom, the 2016 RSA Conference, held between February 29 and March 4 in San Francisco, was cautiously optimistic. Celebrating its 25th Anniversary, 40,000 participants enjoyed continuous content presented in hundreds of sessions covering nearly 30 interest areas. But certain topics drew like moths to

RSA 2016: Strategic risk management for the security-savvy enterprise Read More »

InfoSec 101: Accessing the internet – Safely

Author:  Jeffrey M. Jones, CISSP, CISA Even if you don’t work in the Information Technology or Information Security space, it’s important to understand the risks posed how and where you access the Internet. From hospitals to airports to departments stores to fast food restaurants, Wi-Fi access is available for free just about everywhere. But make

InfoSec 101: Accessing the internet – Safely Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation