by Paul Comfort | Jun 6, 2018 | Cloud, Infrastructure, Security
Security is hard, and here is a great example as to why. I am using Amazon WorkSpaces for this example because I recently ran up against this problem, but a similar issue could happen during any cloud software product’s normal lifecycle. Amazon WorkSpaces is a...
by Marketing | Oct 16, 2017 | Security
The Bat Signal looks a little different these days. Criminals are spending less time robbing banks by blowing up the safe while wearing a clown mask, and more time using the internet and a network connection to wreak havoc on the world’s economy. The world will...
by Marketing | Sep 27, 2017 | Security
Every day our customers release vital information about themselves to companies that they assume are going to protect their data like they would protect it themselves. The assumption is that every business they interact with is up to date and knowledgeable on...
by Marketing | Jul 10, 2017 | Security
American Banker recently explored the need for retailers to consider data security rules used by banks in order to reduce security breaches. From the article: “Target’s recent settlement with 47 states and the District of Columbia over the retailer’s 2013 data breach...
by Paul Comfort | May 17, 2017 | Security
What makes me want to cry is how much this whole thing has been blown out of proportion by people sensationalizing it for various reasons, be it for advertising views, pushing product, or trying to incite panic. There are some things that make this different. These...
by Marketing | May 10, 2017 | Networking, Security
Are you leading with endpoint security? If end-user devices are not secured, any smartphone, tablet or laptop becomes a potential entry point for a cyber threat. Business Solutions recapped some of the top reasons to lead with endpoint security, particularly for small...