In the Information Security world, the one thing that people agree on is the need for change. It is an indispensable thread that weaves throughout every corner of the industry, and defines it. Change Makes You stronger Like many industries, without change there can be no growth. But when it comes to information security, without the constant evolution of the critical policy makers, the main body of security professionals will be unable to rise to the trials and low spots they are sure to face. Call to Action Since mid 2013, S&R professionals have been enjoying what has been dubbed,… Read more ›
In the cat and mouse world of information security, data equals money. The only question is, for whom? Here is a quick rundown of who is looking to steal your data, and what kind, as well as a few guidelines that can help you fight back. Toxic Data, what is It? Any Personal Identifiable Information (PII), Personal Health Information (PHI), or HIPAA Data. This means everything from your first and last name, to your latest hospital or doctor report. Toxic Data can also include Intellectual Property (IP), Payment Card Information (PCI) and sensitive corporate documents. Simply stated: If it’s… Read more ›
nCrypted Cloud would like to wish you a Happy New Year! We would also like to take this time to thank all of our users for their continued support and feedback! nCrypted Cloud has come a long way and we could not have done it without you! We are thrilled to start the new year off strong! Here’s to 2014!
With 2014 right around the corner, there is no better time to reflect on the events of 2013. The tech world in the past year was filled with creativity, innovation, and advancement. However, it was also filled with disappointment, failure, and chaos. While many technology-related incidents did nothing but show the many different ways technology can and has failed us in 2013, these three technology fails represent opportunities for further improvement and hope for technology in 2014. Looking at these tech failures with a glass-half-full perspective, we hope to shed light on the not so obvious silver linings that came with these… Read more ›
Need to buy some last minute stocking stuffers for your tech enthusiast? Have no fear, these 5 tech stocking stuffers are sure to bring in the holiday cheer! 1. Jawbone Mini Jambox ($149.99): Small enough to fit in your pocket, the Jawbone Mini Jambox gives you the ability to play high-quality music anywhere! The Mini Jambox is compatible with all Bluetooth enabled devices, allowing you to connect and play music off your mobile device, tablet, Macbook, and PC computer. Buy it here! https://jawbone.com/speakers/minijambox 2. Mophie Battery Case ($79.95): Never let your iPhone battery life run out with the Mophie Battery… Read more ›
Cyber threats, data breach, and information theft can put business continuity at severe risk. In order to secure corporate data, these questions must be answered and these steps must be followed.
Twitter’s trending topic #FiveWordTechHorrors epitomizes the daily technology-based struggles that have brought us great anxiety, fear, and distress. Here are some of our favorite tech horror tweets
It doesn’t really matter whether you work in the healthcare field, financial services, or in higher education. The bottom line is, everyone just wants to get their work done. This means making deadlines. And one of the ways people are able to do this, and become both productive and competitive, is by harnessing the power of the latest technology trends. Which technology trends are helping the most? If you ask any business professional which technology is helping them be more productive at work, one of the most common answers will be Dropbox. Ever since Dropbox came on the scene, it… Read more ›
It is common for businesses to enforce security practices that are intended specifically to keep competitors and other intruders out or corporate information. However, what many businesses may not realize is how frequently data is stolen from within the corporation itself. The Wall Street Journal recently released some shocking statistics regarding data theft by employees: 50% of employees kept confidential information post-separation 40% of employees claim to use confidential information in their future jobs 60% of employees have seen confidential information belonging to another company being used 52% of employees do not believe it is a crime to use competitor’s confidential business… Read more ›
Cyber security is a persistent issue that can potentially be very costly and harmful to a business. According to Forrester, from January to August in 2012 alone, there have been over 927 cyber incidents and more than 264 million affected records. Costs incurred as a result of data breaches range from around $2,270,000 in Australia to about $5,500,000 in the US. Breach notification laws and fines are driving privacy maturity through the roof. As a Security and Risk Professional, it is your responsibility to protect your company against cyber attacks and data breaches. It is up to you to… Read more ›