What tools do you think of when you think about security? Probably things like your firewall, intrusion detection software, data loss prevention software, antivirus software, a cloud access [...]
Keeping IT teams busy is easy. There’s an unending stream of work to be done—patches, upgrades, and routine maintenance can easily fill up each week. It’s important to make time for IT teams to [...]
Criminals would rather get lucky than work hard and be smart. The rush to remote work during COVID-19 has given them lots of opportunities to be lucky. Many companies suddenly allowed nearly [...]
Too often, businesses are reactive in their information security strategy. They put some basic safeguards in place, and then wait for something—an attack—to happen before doing anything else. [...]
With a pandemic upon us, companies around the globe have rolled out mandatory remote work. When a situation as such arises, there comes many questions and concerns. Is your organization prepared [...]
As coronavirus has more employees working remotely, the security of BYOD devices is increasing in importance. Businesses must take steps to ensure appropriate controls are applied to mobile [...]
Despite the widespread use of mobile devices, desktop systems remain the main tool most employees use to access information technology. It’s important to ensure employees receive good support [...]
Making sure your cloud is safe requires checking security in two places: in the cloud, and on your premises. Cloud Security in the Cloud Many concerns regarding cloud security can be addressed by [...]
There are constant challenges in information technology. Deciding where to focus your efforts is the key to achieving stable infrastructure that supports the business. Some of the more important [...]
Even if you’re taking a “lift and shift” approach to migrating applications and data to the cloud, you can’t take a lift and shift approach to migrating your security strategy to the cloud. The [...]