You’ve heard about Newton’s laws regarding bodies at rest and bodies in motion. A 21st-century corollary is to protect sensitive information when it’s at rest on your network and implement effective safeguards when it’s in motion — for example,...
With the Internet, modern society is connected now more than ever. While this interconnectedness may make some things easier, less savory things, such as identity theft, seem to have become easier as well. Identity theft is a crime that affects millions* of people. It...
Much has been said about data security practices and cybersecurity measures that businesses should follow. All the information and recommendations out there can be confusing and overwhelming. Large data breaches and multiple scary ransomware attacks have...
used with permission from FTC.gov by Lesley Fair Consumers are apprehensive about the security of their personal information and recent headlines about data breaches have moved the needle substantially on the ometer that measures such things. As a business executive,...
used with permission from Norton by Symantec By now you’ve noticed you typically have two options to log in to an online account. One is the traditional username and password combination. The other is the social login, which uses your credentials for a social...
September is National Preparedness Month (NPM) and this year’s theme is “Disasters Don’t Plan Ahead. You Can.” The goal of NPM is to increase the overall number of individuals, families, and communities that engage in preparedness actions at...