Confronting Security Issues in Today’s Mobile Workforce

Mobile allows users to work from anywhere at any time, but the extended office demands modern approaches to extended security Whether it’s the local library of the nearest Starbucks, most open-door establishments provide public Wi-Fi access to their patrons. Some users are merely shopping online or creeping their social networks; others are conducting work-related transactions...
Read more

Critical Actions to Finalize Your GDPR Compliance Program

Starting May 25, 2018, enforcement begins for the new EU General Data Protection Regulation (GDPR) and its heightened principles and requirements regarding data privacy, data processing, and data security. The newly revised regulation applies to organizations doing business in the European Union or processing personal data originating in the EU – including data originating from
Read more

Everything Must Go: Effective Data Removal When a Business Closes

Ineffective data removal from corporate desktop computers, laptops, external drives, servers and other IT equipment containing highly sensitive data can pose a serious security risk down the road.  In March, Toys ‘R’ Us broke the hearts of millions when the company announced the closing of all its 735 U.S. stores. When a business decides to..
Read more

Blatant & Pervasive Incompetencies, Recent History of

Recalling other crisis management fails - in the wake of Facebook's stunning (and probably feigned) ignorance of data exfiltration on their own platform: Via the obviously talented Michael Grothaus, whilst writing at Fast Company, comes this interesting recent history of crisis management at companies-of-note. You will - I am certain - notice a recurring theme of fathomless lack of intellectual capacity. Today's Must Read and filed under 'Blatant Stupidity'. Enjoy! Permalink
Read more
Page 1 of 3612345...102030...Last »