by ray | Feb 7, 2015 | Security
Every other week there is a new high-profile data breach in the media. From Target to Home Depot to iCloud to JPMorgan to Snapchat to the White House—and most recently the devastating attack on Sony Pictures Entertainment—there’s always a headline highlighting the...
by ray | Feb 7, 2015 | Security
This week’s hijacking of several social-media accounts run by U.S. Military Central Command underscores a powerful message: Just because it wasn’t data or computer networks that were attacked doesn’t mean it’s not detrimental to your business. While we’ve heard about...
by ray | Feb 7, 2015 | Security
It landed in my inbox at 1:58 a.m. on Thursday. “To Our Members: Safeguarding your personal, financial and medical information is one of our top priorities, and because of that, we have state-of-the-art information security systems to protect your data.”...
by ray | Feb 6, 2015 | Security, Tech News
You may have worked in the cloud if you’ve ever created and shared a homework document in Google Docs, been on a project team in Basecamp, or used customer relationship management software like Salesforce. Or maybe you regularly dump your photos into Flickr,...
by ray | Feb 5, 2015 | Cloud Tools, Security
As computer hard drives are getting overloaded with information, behavioral professionals are beginning to wonder which companies to trust with their client/patient information. Many data storage companies have developed robust services that clearly identify their...
by ray | Jan 24, 2015 | Security
Your home network is your fortress. Inside it lies tons of valuable information—unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let’s talk about how you can, with the power of...