With so many mobile devices to keep track of in the workplace, IT Managers need to implement tighter security controls, especially if PCI or HIPAA regulatory requirements apply to their organization.
Several approaches are available to help prevent sensitive data from being distributed to unauthorized parties, either inadvertently or maliciously… Continue reading





IT pros are human, but their security lapses can have far more devastating consequences to the business than those committed by ordinary users. This is because IT pros have complete mastery over the enterprise’s network and critical systems.
A recent study by Dimensional Research evaluated the confidence of IT professionals in detecting a cyber attack in progress. While the majority indicated high levels of confidence in their ability to detect a data breach, they were unsure how long it would take automated tools to discover key indicators of compromise.
A study evaluating the attitudes of over 480 IT professionals involved in patch management has found that 50% of their teams struggle to keep up the growing volume of patches.
With data breaches on the rise, the Federal Trade Commission is stepping up enforcement of cyber security audit procedures. Specifically, the FTC is taking a closer look at payments processing and how auditors measure compliance with industry standards.
Market conditions are constantly changing – new players, mergers, reorganizations, and boosting growth quickly to capture new revenue streams before the competition.
While the FBI tussles with Apple over breaking the encryption of an iPhone used by the San Bernardino terrorists, the nation’s premier law enforcement agency finds itself grappling with a security breach of its own.
As more employees use their own personal devices to perform work tasks, rather than use a corporate-owned and managed device, there are a few IT challenges businesses need to overcome.