Read Liz Alton take a look at whether collaboration tools create security risks for your business on Forbes : As companies adopt more diverse technology tools focused on collaboration, security concerns increase. Studies consistently show security is a top focus for companies investing in tools – and these concerns extend to collaboration tools, which can […]
Enterprise Security Risk Management (ESRM) is generally thought of as a holistic management style that incorporates proven risk principles with physical security processes in order to successfully mitigate enterprise risk across the board. Read about the panel discussion about whether Enterprise Security Risk Management (ESRM) is a passing fad or a new industry trend on Campus […]
Internet of Things (IoT) security breaches have been dominating the headlines lately. WikiLeaks’s trove of CIA documents revealed that internet-connected televisions can be used to secretly record conversations. Trump’s advisor Kellyanne Conway believes that microwave ovens can spy on you—maybe she was referring to microwave cameras which indeed can be used for surveillance. Read about […]
Read Elena Titova list five cyber security tools that small and medium businesses should have on Entrepreneur : No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. Read her full article here.
No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. But you don’t have to be passive. Here are five tools and services which small and medium business can use to protect themselves. Read […]
The prevalence of digital technology has made small business owners keenly aware of the security threats they face. However, it is just as important for them to be aware of the physical security threats that threaten their business. Protecting your place of business, whether it is in your home or a retail space, has become much […]
There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision makers to purchase the pricey premium counterparts of these freebies, many are full-blown utilities. Read about the free security tools which can boost your cyber […]
Protecting sensitive information can feel like running on a treadmill: No matter how hard higher education IT professionals work to get ahead, hackers seem to keep gaining ground. Despite ongoing investments in cybersecurity, attackers continue to set new records. Read about the top three cyber security tools which very educational institution should have to counter cyber […]
Read Kevin Beaver’s guide about how to buy the best incident response tools for your company on Tech Target : It’s not what happens to you but how you react to it that matters. This adage is said to date back many centuries but still serves us well today. Looking at it in terms of information […]
Michael Gillespie, a coder that has created a password generator for unlocking the files stashed in a password-protected archive by the CryptoHost ransomware, has also created ID Ransomware, a free online tool for victims to identify with which particular ransomware they’ve been hit. Read about various types of ransomware on Help Net Security.