Ten Tips to Stay Safe on Cyber Monday

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. For employees who spend time making purchases either at lunch, break time, or at the end of the work day, here are some tips to stay safe on the largest online activity day of the year. [1] Make sure your desktop computer, laptop, smartphone, or mobile [...]

By | November 22nd, 2011
Industry InSights, Network Security & Solutions, Security Awareness|Comments Off on Ten Tips to Stay Safe on Cyber Monday

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

Embracing Social Media in the Workplace: Risk or Reward?

Social networking is more than just websites like Facebook, Twitter and Google+ -- it’s also the devices and users that access these sites. Today’s digitally-aware generation of employees are bringing their smart phones and tablets right into the workplace. Not because this digitally-native generation prefers texting to phone calls, and status updates over emails. Mobile technology is not a convenience for them - it’s how they live, and increasingly, how they work. Some organizations view [...]

By | October 25th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Embracing Social Media in the Workplace: Risk or Reward?

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

Bank Companion and InfoSight Enter into Strategic Alliance for the Financial Industry

Partnership Will Focus on Offering Mobile Banking and Mobile Marketing Solutions to Financial Institutions Bank Companion, a leading provider of mobile banking software to banks, community banks and credit unions around the world today announced its partnership with Infosight, Inc. a leading provider of IT infrastructure, security and compliance solutions for financial institutions. Research shows that an increasing number of financial institutions have made mobile banking as one of their top priorities. An Accenture Survey [...]

By | October 12th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Bank Companion and InfoSight Enter into Strategic Alliance for the Financial Industry

How Hackers Target Your Twitter Account

Can you guess how many of the top 10 Twitter users have been hacked? Or what the most common password was before Twitter had to ban it for security reasons? There’s a lot to learn from this infographic from MediaBistro, especially if you’re good at learning from others’ mistakes

By | September 27th, 2011
Industry InSights|Comments Off on How Hackers Target Your Twitter Account

Gartner Research Presents: 16 Criterion for Evaluating the Right Data Backup

Selection Criteria for Database Archiving Products Database archiving is gaining traction as a technology that can significantly improve application performance and reduce storage costs. It is also being used as part of application decommissioning projects to preserve and enable access to associated older data. Key Findings Database archiving products can offer good infrastructure cost reduction when implemented to manage application data growth. Database archiving products can be used to transparently access aging data by offering [...]

By | August 19th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Gartner Research Presents: 16 Criterion for Evaluating the Right Data Backup

Do you know which threats your Anti-Virus won’t stop?

News headlines have been a constant reminder every day that data leakage and malware attacks are on the rise, and increasing at high speeds.  Many believe these malicious attacks are targeted towards large corporations with big bucks, but businesses of all size and functions are facing these risks every day.  Your basic anti-virus solution alone won’t stop these attacks; you need to take extra provisions when protecting your organization. To help you mitigate the risks, [...]

By | April 21st, 2011
Industry InSights, IT Infrastructure|Comments Off on Do you know which threats your Anti-Virus won’t stop?