Jul 8, 2014 | SMB Technology
Businesses are under constant attack from a variety of network security threats. Cybercriminals hack databases for passwords for unauthorized access to your network. Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard drive and destroy application data and files without your knowledge. Businesses large and small face these network security threats on a daily basis; larger organizations, however, may have more resources to fight attacks.
Jun 22, 2014 | News, SMB Technology
May was a busy month for hackers: Lowe’s was targeted, eBay’s huge breach was all over the news, and even a “US public utility” was hacked, according to the Department of Homeland Security (though they don’t wish to tell us which one). It doesn’t seem as though June is going to offer much respite: American Express has already announced a major security breach.
Jun 19, 2014 | SMB Technology
Cloud computing, broadband Internet, and consumerization of IT are fueling the demand for mobile computing. Supporting employees in the field and traveling employees and connecting with customers are top areas of focus for IT today. Support for employees working from home and mobile commerce also drive the demand for mobile computing. The outbreak of mobile computing raises a number of concerns, including device theft and loss, mobile-specific virus/malware, and personal use of business devices. Additionally, mobile users may put additional strain on your corporate network and WiFi connections.
Jun 9, 2014 | SMB Technology
Cloud-based computing adoption is increasing among many businesses. According to the Computing Technology Industry Association (CompTIA) Annual trends in Cloud Computing study, 60% of business owners reported having 30% or more of their IT Systems in the cloud. Additionally, research firm IDC predicts cloud-computing solutions to total $24 billion by 2016.
May 27, 2014 | SMB Technology
The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) continues to blow our minds with the breach penalties it has been announcing. But brace yourselves, because these penalties should continue to grow… so you better plan to nip this in the bud!
May 27, 2014 | SMB Technology
Recent high-profile data breaches, such as those that occurred at Neiman Marcus and Target, have brought privacy breach notification laws into public debate. In the event that your company’s secure information is compromised, it is important to understand privacy breach notification laws and standards.
May 6, 2014 | SMB Technology
Companies small and large are increasingly reliant on their IT systems and infrastructure. Having a Business Continuity plan is a proactive way of avoiding unnecessary downtime due to a disaster, human error, or security breach. Not only may downtime cause data loss, but also according to Gartner Research, a conservative estimate of the cost of downtime for a computer network is $42,000 per hour. For a small business without a Business Continuity plan, such downtime could have long-term crippling implications.
Apr 28, 2014 | SMB Technology
Did you hear that both Wal-Mart and Walgreens Mobile / Web App’s were recently compromised? If you’d like the full story from March 25th, see the link at the bottom. While these events may seem like a daily occurrence, the question we’re all asking is if it’s worth playing games – or if it’s time to get the truth about how secure environments really are.
Apr 16, 2014 | SMB Technology
The name Heartbleed OpenSSL Vulnerability (aka Heartbleed bug) is as scary as it sounds. Some reports say up to two thirds of all secure websites (e.g. those with a web address starting with a green https://) are using OpenSSL. It has been reported that Google was first to discover the Heartbleed bug that compromised sites including Yahoo, Tumblr, Flickr, Amazon, and other websites relying on OpenSSL for security. This security breach may provide hackers access to accounts, passwords, and credit card information.
Apr 9, 2014 | SMB Technology
Many Smartphones and Tablet computers have access to corporate applications and their data through Bring Your Own Device (BYOD) policies and corporate-sponsored mobility strategies. Mobile Security has become a popular topic for good reason. According to CIO Insights, mobile data traffic is expected to increase eleven-fold by 2018. Because of increasing data traffic on mobile devices, some government agencies are looking at legislation to require manufacturers to add a smartphone kill switch to remotely wipe a mobile device if it is lost or stolen.
Page 24 of 31« First«...10...2223242526...30...»Last »