Online File Sharing And The Importance Of Security

Computer-Virus-Statistics

Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at the office all night. As a trusted member of your company, you are authorized to view this type of

Enjoy Full Article

Coke’s Internal Data Breach – Lessons Learned

ScottWalters

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and

Enjoy Full Article

5 Cloud Security Predictions For 2014

Larry_Warnock

5 Cloud Security Predictions For 2014 Data security is always a hot topic among IT industry pundits, but I believe 2013 will go down as the year security crawled out of the basement and into the cultural zeitgeist. Edward Snowden and the NSA spying revelations may have been the biggest tech story of the year.

Enjoy Full Article

Understanding Twitter’s Security Enhancements

attacks-twitter

Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies,

Enjoy Full Article

5 Reasons Why The Cloud Is Still Not 100% Secure

crime-cyber

5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals

Enjoy Full Article

Symantec Report Keeps Cloud Users Security-Savvy

cybercrime-report

Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat

Enjoy Full Article

Better Data Risk Mitigation For SaaS Providers

SaaS-Security

Better Data Risk Mitigation for SaaS Providers We live in a world that is rife with internal-controls breakdowns that result in security and data breaches, which can cause tremendous business and reputational damage for organizations. The rise of cloud computing systems has now created an even greater need for organizations to develop the right controls

Enjoy Full Article

SaaS For Startups: 6 Things Every CEO Should Know

office-saas

SaaS For Startups: 6 Things Every CEO Should Know SaaS packages have evolved from large enterprise commodities to must-have solutions for businesses of all sizes. Once reserved for large corporate infrastructures, the evolution in cloud technology and the BYOD trends have changed how businesses use and license out SaaS platforms. That being said, with all of the

Enjoy Full Article

The Lurking Threat of Bring-Your-Own-Cloud (BYOC)

Nimmy-Reichenberg

The Lurking Threat of Bring-Your-Own-Cloud (BYOC) A few generations back, when the Internet was still an unknown commodity and inter-office mail came around in manila envelopes graffitied with the crossed-out signatures of every recipient that envelope had ever met, network security was largely an in-house affair with data tapes and mainframes playing a central role.

Enjoy Full Article

Five Ways To Boost Your Cloud’s Security

Five Ways to Boost Your Cloud’s Security There is no disputing the fact that Cloud computing is on the rise. Regardless of myths and rumors, Cloud computing is steadily becoming a more viable for various applications and uses. As such, the Cloud works by using the Internet for the storage and transmission of voice, data,

Enjoy Full Article

Cloud Infographic: How A Data Breach Happens

data-breaches

Cloud Infographic: How A Data Breach Happens While we are all very happy about the entire cloud data storage concept and feel that it’s a breath of relief from the constant battle against malware, key loggers, PC monitoring software, and whatnot, we tend to forget that there are steps which we need to take to ensure

Enjoy Full Article

What Cloud Consumers Need To Look Out For In Cloud Contracts

What Cloud Consumers Need To Look Out For In Cloud Contracts Many people think cloud computing contracts look out for service providers alone. There are different factors that fuel this attitude. Even then, many consumers still feel like they have no choice. Providers tell them what they can and cannot get. This development is negative

Enjoy Full Article

Cloud Security: Fears And Challenges

Cloud Security: Fears And Challenges Recent studies have shown that more than 60% of IT managers admit to security as the main stumbling block to their integration of cloud computing, with data protection and a perceived lack of regulation being their chief concerns. In another global study by IBM that involved more than 500 IT

Enjoy Full Article

Which Governance Framework Is Right For Cloud Computing?

Which Governance Framework Is Right For Cloud Computing? The Threat Cloud computing is revolutionizing how organizations use technology worldwide and for a good reason, it leverages on economies of scale more than any application of technology in recent history. And with the economic stability of the world swaying back and forth, organizations and businesses are

Enjoy Full Article