You know those pesky reminders that pop up on your monitor? They are always reminding you that your applications and drivers are out of date. It always seems like they rear their ugly reminders right when you’re in the middle of something important. Well, you should follow them and keep your computer up to date. […]
In 2012, human errors and system glitches were the cause for almost two-thirds of data breaches globally. Malicious attacks—and those include insider theft—accounted for almost half of the reported breaches in 2012, in the U.S. alone. An open environment can be a really good thing. There are businesses today preaching the virtues of open book […]
Subscribe to our newsletter
Sign up to receive blog updates and research about the latest IT industry trends. Delivered right to your inbox.
You walk down these halls everyday, under the glowing rectangular lights, past the conference room windows. You see the offices where you and your colleagues stack framed family pictures on your desks. Before you even get to the break room door, you can smell the burnt popcorn. And even though you now remember the lunches […]
While cloud security is extremely important, there are many other things that need to be secure at your business. Keeping Your Building Secure The first thing that you need to consider when thinking about security outside of the cloud is the building that you work in. Are there security guards? Are they employed by your […]
‘Twas the week before Christmas and all through the office, All the workers were shopping online like an internet novice. Cyber thieves were nestled all snug in their chairs, Waiting for work place shoppers who were completely unaware. As they utilized corporate resources to shop for their families, The thieves used Malware exploits to steal […]
One size doesn’t fit all in gloves – just ask OJ! Neither does it in the realm of Data Protection. Many cloud backup firms only offer their solution in the traditional SaaS or Public Cloud model. This model typically means the client is using the provider’s software and using the provider’s remote facilities to store […]