Tag Archives: vulnerabilities

The Sticking Points Of Security And Privacy

The Sticking Points Of Security And Privacy

The Sticking Points Of Security And Privacy “No matter how many times a privileged straight white male technology executive pronounces the death of privacy, Privacy Is Not Dead. People of all ages care deeply about privacy and they care just as much about privacy online as they do offline” (Danah Boyd) Security and Privacy are

Shining A Light On The Shadows Of “Shadow IT”

Shining A Light On The Shadows Of “Shadow IT”

Bring Your Own Cloud (BYOC) and Bring Your Own Device (BYOD) have changed the way that people work by putting users in control of their productivity. Employees can now obtain the capabilities they want, when they want and for as long as they want, without having to wait for IT to build it. And with

Online File Sharing And The Importance Of Security

Online File Sharing And The Importance Of Security

Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at the office all night. As a trusted member of your company, you are authorized to view this type of

20 Million Credit Cards Compromised In South Korea

20 Million Credit Cards Compromised In South Korea According to BBC, 20 million South Korean credit card details have been stolen in one of the biggest security robberies the country has faced, affecting almost half of the population. A contractor for the Korea Credit Bureau managed to gain access and copy 20 million unencrypted names, social security numbers

Cloud Infographic: Is Your Password Safe On The Cloud?

Cloud Infographic: Is Your Password Safe On The Cloud?

Cloud Infographic: Is Your Password Safe On The Cloud? In the modern world of Internet connectivity, cloud computing, online banking, social networking, personal privacy and information security is essentially dependent upon password protection. Passwords are the crucial barrier that safeguards the personal information contained in the perhaps dozens of accounts that we interact with every