CIOs (or Chief Information Officers) are often faced with the same balancing act when it comes to security - maintaining sufficiently tight control to protect assets and sensitive data, which could prove costly in the event of a leak or breach, AND ensuring these controls are not so stringent that employees are discouraged from embracing IT and technological innovation, or attempt to bypass them completely. It’s a fine line to walk.
Small businesses are not the most lucrative companies a fraudster can target, and breaching them provides little kudos for the attention-seeking hacker. Most of the sources of danger to your business are therefore not complex attacks, but are simple threats based closer to home. It is more likely that someone you employ will be fooled into opening an attachment that unleashes rogue computer code that can delete your data or turn your mail server into a spamming engine.
Today, we use our mobile devices for much more than making phone calls. Actually, the way we use our mobile phones and tablets is increasingly more like the way we use our computers. It is easy and convenient to send instant messages, email, conduct business, use social media, download music, apps and videos, and even shop and make purchases. As we move towards using our mobile devices for these more privacy-sensitive applications, how do we keep our devices and personal data safe?
If you are engaging in cloud-based activities, you are placing a high level of trust with the cloud providers to keep your information safe and private. This is especially true for enterprises that house their company data in the cloud.
In this two-part article, we are going to explain what is meant by cloud computing. Then, stayed tuned for a follow-on to this when we discuss cloud computing in more detail, including the security of the information you store in the cloud.
What is cloud computing?
How does it work?
Do you know what EMV is?
Happy Thanksgiving! What are you most thankful for?