Tag Archives: security

Five Social Media #Security Tips

Many of the previous posts on this blog have been geared toward midsize businesses to assist them with their information security strategies and to keep their data safe. However, with the widespread use of social media, this post focuses on … Continue reading

Posted in Cybersecurity, data protection, Data Security, Email, Social Media | Tagged , , , , | Leave a comment

Three Security Concerns for 2016

As we near the end of 2015, what will 2016 look like in the information security sector? Undoubtedly there be an increase in data breaches across all industries, but will businesses take the high road and inform their customers and … Continue reading

Posted in Business Process, BYOD, corporate data, Data Breach, data protection, Data Security, Internet of Things, Mobile Malware | Tagged , , , , | Leave a comment

Don’t Forget Security When Considering a Merger or Acquisition

In today’s competitive era, businesses all want to stand apart from the competition. Some businesses may provide a truly unique product or service, some may have a celebrity endorsement, and some may sport a memorable name. But as businesses become … Continue reading

Posted in Business Process, corporate data, data protection, Data Security, Management and Technology, Network Security | Tagged , , , , , | Leave a comment

Don’t Forget Security When Developing Corporate Mobile Apps – Time for Another Look

About a year ago, I wrote a post about the importance of security when developing mobile device apps. As part of the post, I also discussed the importance of security when evaluating the “bring your own device” to work (BYOD) … Continue reading

Posted in BYOD, Data Breach, Data Security, Internet of Things, MSP, Privacy Rights | Tagged , , , , | Leave a comment

12 Timeless Password Tips for Improved Security

According to Splashdata, the #1 and #2 most commonly used passwords are “123456” and “password,” so the creation of strong passwords is one way that users can be proactive in fighting security breaches. Since passwords are the core of an … Continue reading

Posted in Business Process, Data Security, Network Security, Tech Equipment | Tagged , , , | 1 Comment

Are You Integrating Security into Your Celebration of #CXDay?

Is the first Tuesday of October marked as a special date on your calendar? If not, the significance around social channels will alert you to this hashtag. The second Tuesday in October is #CXDay, and according to Annette Franz (@CXJourney … Continue reading

Posted in Business Process, Data Breach, Data Security | Tagged , , , | Leave a comment

Don’t Forget Security When It Comes to E-Waste

With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. … Continue reading

Posted in Data Security, Network Security, Tech Equipment | Tagged , , , | Leave a comment

Do Your Customers Want to Be Tracked?

A major entertainment company recently made news when it announced a new tool available at its theme parks. Under the guise of making visits more “fun and easy,” theme park guests are now able to wear a type of bracelet … Continue reading

Posted in Bluetooth Technology, Cybersecurity, Data Security, Mobile Computing, Privacy Rights, Tech Equipment | Tagged , , , , , | 1 Comment