by Christine Thome | Jun 6, 2018 | Networking, Security
The digitalization of our society is happening now, uniquely and definitively transforming how organizations operate on a day-to-day basis, and opening up progressive and exciting opportunities across all industries. Some of these include: In hotel and lodging, mobile...
by Christine Thome | Jun 6, 2018 | Backup, Security, Storage
Along with most everyone rushing to update their privacy policies and reaffirm your consent, the “other” copies of your data have begun to creep into the discussion, such as a piece that appeared on The Register. Wait? What other copies?!? You know, all...
by Paul Comfort | Jun 6, 2018 | Cloud, Infrastructure, Security
Security is hard, and here is a great example as to why. I am using Amazon WorkSpaces for this example because I recently ran up against this problem, but a similar issue could happen during any cloud software product’s normal lifecycle. Amazon WorkSpaces is a...
by Christine Thome | Jun 5, 2018 | Uncategorized
Although many industries have long offered product warranties to assure customers the products they purchase will function as advertised, this has not been true for cybersecurity. When a security product fails, customers have had little recourse — until now....
by Christine Thome | May 25, 2018 | Uncategorized
Most of Chi’s customers live in the United States and are not subject to GDPR. However, some of our customers operate multi-nationally so we felt a statement was prudent. 1. This is not a legal document. This is simply a statement of our commitment to our...
by Christine Thome | Apr 3, 2018 | Uncategorized
Google’s Gmail for Business Offers High False Positives Excerpted from the March 28, 2018 IRONSCALES Blog, written by Eyal Benishti Google’s Gmail for Business has had an overhaul and now claims to offer AI-powered security features. According to its marketing...
by Christine Thome | Jan 31, 2018 | Uncategorized
Excerpted from the Barracuda Blog, by Christine Barry It’s Tax Identity Theft Awareness Week in the United States, which means that tax-related identity theft happens often enough to get the government’s attention. The Federal Trade Commission...
by Christine Thome | Jan 5, 2018 | Uncategorized
Excerpted from Cylance Blog, January 4, 2018 Chip manufacturers have acknowledged a set of vulnerabilities (CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754) that are exploitable at the hardware architecture level, leaving multiple operating systems impacted,...
by Christine Thome | Jan 3, 2018 | Uncategorized
To keep networks safe, higher education leaders need to ensure security measures are easy to navigate. Excerpted from EdTechMagazine.com, October 11, 2017 As students, faculty and staff settle into the routines of a new semester, it’s the perfect time for a...
by Christine Thome | Dec 13, 2017 | Uncategorized
Excerpted from the Barracuda Blog, December 1, 2017, by Mike Vizard Most organizations today don’t really know how much their information is worth, which tends to make securing data across an enterprise an exercise in futility for many IT security...