Lifting the Fog to See the Reality of Compliance- Part 2 In part 1 we highlighted compliance as a whole. In this continuation we will be discussing regulatory compliance by data. Or, more explicitly, what data is expected to be protected. When we say data, we mean the documents, databases, and other files within systems. […]
Lifting the Fog to See the Reality of Regulatory Compliance- Part 1 This series will highlight the most frequently asked questions and misconceptions that circle the world of regulatory compliance needs. This series will not be focused on a particular industry or sector but, rather agnostic overall. However, some specific requirements will be called […]
Many times, firewalls are seen as the silver bullet for border security in networks, but this simply isn’t the case. A traditional firewall has been replaced, but even the best UTM devices require assistance from other tools to best protect all areas of todays ever expanding global borders. But at the firewall/UTM level, these are […]
In recent weeks privacy has been lost for many. Social media continues to be an avenue where people get a false sense of security. However, over the last few weeks many have learned the hard way that things are not always what they seem. Just to name a few of the major leaks of late, vk, […]
The time of year when online purchases sky rocket is here. Shopping and travel for the holidays is much easier now than it was in the past. Unfortunately, muggers and con-artists know this and are even more common online than on the streets. So how can you protect yourself online? Here are a few tips for safe shopping. Use Reputable […]
The web can be a wonderful place, but it can be very merciless. Always remember that once something goes over the wire, it is out of your hands. Always use strong passwords for websites and use a different password for each site. This can make it hard to remember you passwords, but in situations of data […]
Two areas of infrastructure that are too often neglected have been growing in recent years. The adoption rate, often unapproved by IT and management, has been on a steep incline in all areas of business from home offices to multinational organizations. This is of course the Internet of Things (IoT) and Bring Your Own Device […]
Firewalls are meant to be a mechanism between devices limiting access. When discussing hardware or network firewalls specifically or security appliances in general, the talk has changed over the years. Firewalls, Proxy Firewalls, Next Generation Firewalls (NGFW), Unified Threat Managers (UTM), they go by many names now but they shouldn’t be used interchangeably. As the […]
Every business owner knows that natural disasters can be fatal to their organization. Many small businesses cannot afford to have multiple offices across geographical locations that would let them continue operations if one location is damaged by flood, fire, tornado or any other phenomenon. Many rely on insurance to cover losses, but this does not […]
The best place to start in securing your network and your data is to understand the network. Know your environment, know your work flow, know your logical points of entry. When keeping these factors in mind, create overlap between protective measures. Physical Security- Fences, Locks on doors, alarm systems, cameras, and flood/fire protection belong here. There […]