The Best Tech Stocking Stuffers of 2013!

By

Need to buy some last minute stocking stuffers for your tech enthusiast? Have no fear, these 5 tech stocking stuffers are sure to bring in the holiday cheer! 1. Jawbone Mini Jambox ($149.99): Small enough to fit in your pocket, the Jawbone Mini Jambox gives you the ability to play high-quality music anywhere! The Mini Jambox is compatible with all Bluetooth enabled devices, allowing you to connect and play music off your mobile device, tablet, Macbook, and PC computer. Buy it here!  https://jawbone.com/speakers/minijambox 2. Mophie Battery Case ($79.95): Never let your iPhone battery life run out with the Mophie Battery… Read more ›

The Best Tech Stocking Stuffers of 2013!

By

Need to buy some last minute stocking stuffers for your tech enthusiast? Have no fear, these 5 tech stocking stuffers are sure to bring in the holiday cheer! 1. Jawbone Mini Jambox ($149.99): Small enough to fit in your pocket, the Jawbone Mini Jambox gives you the ability to play high-quality music anywhere! The Mini Jambox is compatible with all Bluetooth enabled devices, allowing you to connect and play music off your mobile device, tablet, Macbook, and PC computer. Buy it here!  https://jawbone.com/speakers/minijambox 2. Mophie Battery Case ($79.95): Never let your iPhone battery life run out with the Mophie Battery… Read more ›

Infographic: 5 Steps To Secure Corporate Data

By

Cyber threats, data breach, and information theft can put business continuity at severe risk. In order to secure corporate data, these questions must be answered and these steps must be followed.

Tweet Feed: The Best of #FiveWordTechHorrors

By

Twitter’s trending topic #FiveWordTechHorrors epitomizes the daily technology-based struggles that have brought us great anxiety, fear, and distress. Here are some of our favorite tech horror tweets

IT: Nurturer of Business Innovation or Ball and Chain?

By

It doesn’t really matter whether you work in the healthcare field, financial services, or in higher education. The bottom line is, everyone just wants to get their work done. This means making deadlines. And one of the ways people are able to do this, and become both productive and competitive, is by harnessing the power of the latest technology trends. Which technology trends are helping the most? If you ask any business professional which technology is helping them be more productive at work, one of the most common answers will be Dropbox. Ever since Dropbox came on the scene, it… Read more ›

3 Ways Your Employees Are Stealing Corporate Data

By

It is common for businesses to enforce security practices that are intended specifically to keep competitors and other intruders out or corporate information. However, what many businesses may not realize is how frequently data is stolen from within the corporation itself. The Wall Street Journal recently released some shocking statistics regarding data theft by employees: 50% of employees kept confidential information post-separation 40% of employees claim to use confidential information in their future jobs 60% of employees have seen confidential information belonging to another company being used 52% of employees do not believe it is a crime to use competitor’s confidential business… Read more ›

Protect Your Employees, Protect Your Company

By

Cyber security is a persistent issue that can potentially be very costly and harmful to a business. According to Forrester, from January to August in 2012 alone, there have been over 927 cyber incidents and more than 264 million affected records. Costs incurred as a result of data breaches range from around $2,270,000 in Australia to about $5,500,000 in the US. Breach notification laws and fines are driving privacy maturity through the roof.   As a Security and Risk Professional, it is your responsibility to protect your company against cyber attacks and data breaches. It is up to you to… Read more ›

Understanding HIPAA Rules & Compliance

By

The Health Insurance Portability and Accountability Act, more commonly known as HIPAA, was enacted in 1996 to improve the Medicare Program (Title XVIII Social Security Act), Medicaid Program (Title XIX), and the overall effectiveness of the health care system. HIPAA aims to reduce health care fraud and abuse by mandating industry-wide standards for health care information on billing and other processes and by requiring the protection of confidential handling of protected health information (PHI, ePHI) through established standards and requirements for the electronic transmission of health information. HIPAA consists of 5 Titles Title I: HIPAA Health Insurance Reform Title II:… Read more ›

Understanding The Cloud: Public vs. Private Clouds

By

While The Cloud has been around for quite some time, more and more businesses and consumers alike are switching to the cloud for storage, sharing, and collaboration purposes. The growing popularity of the cloud is due to its ability to reduce costs, broaden accessibility, and increase productivity and efficiency. According to Gartner, the personal cloud will gradually replace the PC as the primary place to store personal content. By the end of 2013, it is predicted that there will be a $131 billion global cloud services market. Furthermore, according to Forbes, the Cloud will generate 14 million jobs by 2014.… Read more ›

Stuxnet Illuminated

By

I came across a mind-shattering paper the other day, written by Ralph Langer, the man who discovered Stuxnet. The surprisingly easy to follow, 36 page document that was released this month, goes into incredible detail as to the precise methods Stuxnet used in order to attempt to cripple the Iranian fuel enrichment program at Natanz. This was interesting, because it involves so many important questions that affect the human race as a whole. Everything from nuclear energy debates and wartime ethics, to cybercrime and corporate information security, can be related to the first real “cyber – physical weapon technology”. One… Read more ›