Posted on 18 February 2016 by Michal Cohen
In an effort to simplify your consideration process and shed some light on different deployment types, here are a few pointers to keep in mind when looking at three different types of solutions deployments i.e. cloud solutions, on-premises solutions and mobile solutions.
Posted on 16 February 2016 by Jennifer Dean
According to many security experts, 2016 is set to be the year of enterprise mobility. For years, we’ve seen record growth in the use of mobile devices in our personal lives and some of the statistics are fascinating. 84 percent of people surveyed in a Time Magazine mobility poll said they couldn’t go a single day […]
Posted on 09 February 2016 by Thales DIS
Even though the Fraternal Order of Police (FOP) website apparently harbored sensitive data such as police officer contracts and officer-to-officer correspondence, it was likely never required to ensure strong encryption to protect its sensitive data nor strong authentication to secure member access.
Posted on 21 January 2016 by Michal Cohen
With “Mobile Everything” trending and BYOD becoming a standard, it seems common help desk issues have to do with access restrictions i.e. “authentication denied” or “login failed”. Here are some suggestions for how to address.
Posted on 14 January 2016 by Jennifer Dean
If you’re one of Facebook’s 1.55 million users, here’s a resolution you should heed if you want to keep yourself and your friends safe: Be less gullible.
Posted on 07 January 2016 by Thales DIS
On December 15, 2015, the 28 EU Member states finalized the language of the new General Data Protection Regulation, meaning that a single set of information security rules will be enforced in the EU starting around 2018—providing organizations a two-year period to become compliant.