by Shlom | Jun 12, 2017 | Uncategorized
In spite of the big headlines about external hacks or insider attacks leading to data loss, it is true that most of the corporate data that gets exposed is through messaging systems. Employees accidentally sending out confidential information through email, instant...
by Shlom | Jun 12, 2017 | Uncategorized
In the modern world of financial services, the protection of your customer’s data is critical. Not only critical for your company’s reputation but to avoid a whole host of legal and financial obligations should a data breach ever happen. Encryption is one...
by Shlom | Jun 12, 2017 | Uncategorized
According to some studies, over two-thirds of lost smart phones contain sensitive or confidential business information. This can lead to, sometimes serious, breaches of data and confidentiality. With the increasing use of mobile hardware in businesses – whether this...
by Shlom | Jun 12, 2017 | Uncategorized
If anything, recent attacks have shown that there is no single solution to the complex challenge of being protected against insider threats within an enterprise. However, one major defense against such issues is putting in place prudent policies, with strict limits,...
by Shlom | Jun 12, 2017 | Uncategorized
Antique, vintage, throwback. These words are often used in today’s world to refer to objects that are cool, steady or unique. However, when it comes to software these are the last things you want. This blatant security risk may seem obvious, and no one likes to...
by Shlom | Jun 12, 2017 | Uncategorized
For years, patch management has been a thorn in the side of organizations and continues to be a popular topic of discussion. Management of an organization’s security is an increasingly critical aspect of the modern business. Technology continues to evolve and...