Data Loss Prevention: Should You Trust Your Employees?

Stolen identities, bank accounts and credit card numbers are sold in bulk every day in shadowy online forums, often for pennies on the dollar. Cyber criminals can easily make a few hundred to a few thousand bucks a day from selling this stuff. Data can be breached in many ways including intercepting it as it travels across the network, stealing data that is stored in file shares, databases and endpoints, and spying on data that’s [...]

By | March 22nd, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on Data Loss Prevention: Should You Trust Your Employees?

10 Tips to Help You Decide Which Email Archive Solution Is Best For Your Organization

Choosing whether or not to archive is a no-brainer—archiving is a must for most organizations. Determining whether or not to implement an in-house archiving system or outsource the task to a SaaS provider is a bit more complicated. There are a variety of factors to consider before making a choice, as every organization has different goals to meet and resources available to them. Before you make a decision about whether to implement an in-house email [...]

By | March 22nd, 2011
Email & Hosted Solutions, IT Infrastructure|Comments Off on 10 Tips to Help You Decide Which Email Archive Solution Is Best For Your Organization

Don’t Let Development Pressures Cut Security Testing Short

Don't let development pressures cut security testing short. There are more than 5,000 known security vulnerabilities and the number is growing.  In 2008, there were 11.5% more internet security vulnerabilities disclosed than in 2007. That's because we're getting better at identifying and eliminating vulnerabilities. But all the progress made can be thrown out the window, if you're in a hurry to roll out the latest and greatest software upgrade. There are a lot of reasons [...]

By | March 3rd, 2011
IT Infrastructure|Comments Off on Don’t Let Development Pressures Cut Security Testing Short

What Are the Top Security Threats for 2009?

Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on What Are the Top Security Threats for 2009?

Don’t Let Development Pressures Cut Security Testing Short

There are more than 5,000 known security vulnerabilities and the number is growing. In 2008, there were 11.5% more internet security vulnerabilities disclosed than in 2007. That’s because we’re getting better at identifying and eliminating vulnerabilities. But all the progress made can be thrown out the window, if you’re in a hurry to roll out the latest and greatest software upgrade. Don’t cut security testing short just to meet deadlines...

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on Don’t Let Development Pressures Cut Security Testing Short