Hiring Information Security Aware Workers

March 16, 2016

Today’s HR departments are faced with many challenges when it comes to selecting the correct candidate for an open position. Beyond the ubiquitous background checks, knowledge assessment and checking references, HR needs to take other factors into consideration to select the best candidate. Nowhere is this truer than in organizations looking to hire knowledge workers, […]

Read the full article

Job Seekers Must Leverage IT Security Concepts to Score a Position

February 23, 2016

Job seekers often face near insurmountable tasks when securing an interview for positions that are data intensive and bound by compliance laws and regulations. Nowhere is this more evident than in the financial, healthcare, insurance, and banking markets. All of which hold data governance in high regard and seek to protect both intellectual property and […]

Read the full article

What’s Your Business’s Greatest Cyber Threat?

March 12, 2015

In the past year, cyberattacks have littered our news feeds, displaying the high cost of a corporate hack. In the last year behemoths like Target, Home Depot, Sony and Anthem have paid the price and are still working to improve their systems and repair their reputations. Despite recent discouraging occurrences, many organizations are looking at […]

Read the full article

The High-Cost of Hacks

March 10, 2015

It’s the question on everyone’s mind: How secure is your data? The Federal Bureau of Investigation warned major healthcare providers in September with estimates that private health records sell for 10 times more than credit card information on the black market. Whether you’re worried about your own personal information or the safety of records your company holds, data […]

Read the full article

Obama’s Cybersecurity Executive Order

February 26, 2015

With a growing number of high profile companies becoming the targets of devastating hacks and data security breaches,it’s imperative that organizations double down on their IT security defenses. In the U.S., collaborative information sharing on cyber threats between the private sector and the government is also becoming a bigger piece of the puzzle, thanks to a new […]

Read the full article

The Cyber Security Challenge

February 13, 2015

2014 was a year plagued by massive data breach after massive data breach. In the aftermath of these highly-publicized hacks, the importance of cyber security has come to the forefront of discussion for both the media and businesses alike. Experts are predicting that not only will the costs associated with these hacks continue to rise, […]

Read the full article