IT vs. Legal: Who’s Responsible?

Technology and IT is deeply integrated into all areas of business operations, which begs the question who is responsible for maintaining certain policies?  There are those who believe that IT is responsible for certain policies since they are so uniquely involved with technology solutions, while others may feel that this should be a legal matter…

Details

Why Your Company Needs Cyber Insurance

The Secrets Out  It’s no secret that cybercriminals use social ingenuity to go around secure technology protection to filter through different banking accounts, email accounts, company databases, and other areas with sensitive data. These attacks are all-too familiar. The criminals can then take this data to steal money, identities, plan future attacks or in the…

Details

The Importance of Security Training

Picture this, you’ve  just installed one of the most expensive, state-of-the-art security system there is to protect your home. A phenomenon in the tech world, it combines motion detection, heat sensors, intrusion barriers, hair-trigger alarms, sophisticated locks—the whole nine yards. This system will frustrate and bewilder the most experienced criminal. Unfortunately, such a system can…

Details
Password Manager

The Key to Password Protection

It’s not new information that password protection is the number one end-user security measure you can take to make sure you are being safe online. Certainly, by now you’ve heard how risky it is to use the same password for each account you have — but remembering several unique passwords can be difficult. How often have…

Details