Ask your question

Latest article

N°25 The CIO: A Closer Look at IT security trends

CIOs (or Chief Information Officers) are often faced with the same balancing act when it comes to security - maintaining sufficiently tight control to protect assets and sensitive data, which could prove costly in the event of a leak or breach, AND ensuring these controls are not so stringent that employees are discouraged from embracing IT and technological innovation, or attempt to bypass them completely. It’s a fine line to walk.

N°24 Small business security

Small businesses are not the most lucrative companies a fraudster can target, and breaching them provides little kudos for the attention-seeking hacker. Most of the sources of danger to your business are therefore not complex attacks, but are simple threats based closer to home. It is more likely that someone you employ will be fooled into opening an attachment that unleashes rogue computer code that can delete your data or turn your mail server into a spamming engine.

N°23 Mobile Device Security

Today, we use our mobile devices for much more than making phone calls. Actually, the way we use our mobile phones and tablets is increasingly more like the way we use our computers. It is easy and convenient to send instant messages, email, conduct business, use social media, download music, apps and videos, and even shop and make purchases. As we move towards using our mobile devices for these more privacy-sensitive applications, how do we keep our devices and personal data safe?

N°22 Is cloud computing secure?

In part one of this article, “Cloud Computing and Security,” we discussed the basics of cloud computing and some common types of cloud computing applications. Now, we will go into more detail about the safety of the information you store in the cloud.

If you are engaging in cloud-based activities, you are placing a high level of trust with the cloud providers to keep your information safe and private. This is especially true for enterprises that house their company data in the cloud.

N°21 What is cloud computing?

In this two-part article, we are going to explain what is meant by cloud computing. Then, stayed tuned for a follow-on to this when we discuss cloud computing in more detail, including the security of the information you store in the cloud.

What is cloud computing?

How does it work?

Poll

Do you know what EMV is?

FOLLOW US ON

Some say #wearabletech isn’t going to take off until it gets fashionable. Is style holding you back from any gadgets? http://t.co/VMdWBJTU2q