Where would security fall when our data is in a shared space, when privacy is of great concern and breaches are occurring every day even in a secure network? Private clouds seem to be the answer. Private clouds sit in a public facility on a dedicated system with very specific service-level agre ...
Read MoreCompanies may have to start spelling out security policies for mobile devices since there are no written ones, or if they do exist, they are ambiguous. Employees are provided with mobile phones so they are reachable any time, any where. This means the employee may answer the phone while drivin ...
Read MoreWhen it comes to credit card misuse or breach, we refer to PCI compliance standards. When it comes to personal data breach, we go looking for data security and privacy protection laws. Nowadays our personal data has found its way to libraries, online retailers, airlines and every one in between. Of ...
Read Morehttp://www.youtube.com/watch?v=rJZNYuMclNM&feature=youtu.be Social media has expanded from entertaining and exciting "Flash Mobs" to much more sinister events called "FLASH ROBS". "Flash Mobs" refer to spontaneous dancing or other antics of a group of people while "Flash ROBS" are when dozens of peo ...
Read MoreYou are going about your daily business, when you find an old Word document in your laptop that has some Personally Identifiable customer information in it. Since you recently updated your data security policies and have decided not to store information like this outside of your password protected d ...
Read More