Monthly Archives: September 2015

How to Make Sure Your Brand Is Not #1 When It Comes to Cybersecurity Breaches

According to a recent post in NetworkWorld by Maria Korolov, the Massachusetts Institute of Technology (MIT) scored at the bottom in a cybersecurity survey of 485 large colleges and universities. For a prestigious university known internationally for producing talented individuals … Continue reading

Posted in Cloud Computing, corporate data, Cybersecurity, Data Breach, data protection, Data Security, Disaster Recovery, Email, Management and Technology, Network Security | Tagged , , , , | Leave a comment

Does Your Business Have a Cloud Computing Usage Policy?

Many businesses have a Bring Your Own Device (BYOD) to Work policy, a risk management policy, and some businesses are even tech-savvy enough to have a social media policy. Some businesses go one step further and introduce and review all … Continue reading

Posted in Business Process, BYOD, Cloud Computing, Cybersecurity, Data Breach, data protection, Data Security, Management and Technology, Network Security, Telecommuting | Tagged , , , | Leave a comment