secure
Sophisticated phishing
Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing ...

Securing Devices at Home and Work
It's National Cybersecurity Awareness Month! We're sharing tips to secure your devices at home and at work so that you can #BeCyberSmart. The post Securing Devices at Home and Work appeared first ...

Revocation of Millions of Certificates Leaves Websites Labeled as ‘Insecure’
A certificate authority named Let’s Encrypt found a bug in code used to generate certificates and was forced to revoke millions of certificates, leaving websites very little time for renewal. When a ...
Secure SD-WAN Needs to Support Your Cloud On-Ramp Strategy
Connecting the Branch to the Cloud The expansion of the network is about much more than adding new devices and platforms. Maximizing the benefits of an extended, scalable, and highly elastic network ...

File Encryption Using VHD and BitLocker
When I was thinking of topics to write about, the idea of protecting the data we work with came to mind. There’s always some sort of data that we want to keep ...
Why is an information security policy so important?
Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines the key terms of ISO 27001, the international standard for information security ...

Information Risks of Travel
So, you’re on the road for work again, are you? Or, you’re heading out soon? Regardless of when, if you travel for work you should know about the information risks of travel ...

Secure, Cloud Mac® Management
As Macs® infiltrate organizations, many IT admins are looking for a secure, cloud Mac management solution. After all, an increase in Mac adoption has brought along with it a 72% increase in ...
Keeping your business and personal instant messages secure
Most people want to know their instant messages are securely wrapped up—whether that's for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs ...