Top 5 Security Apps for IT Professionals

July 27, 2016

As technology and the internet continue their rapid advancement toward the bold future, issues of cyber security remain a significant threat to companies of all sizes. IT professionals at the ground level have their work cut out for them when it comes to keeping their businesses and clients safe, which is why anything they can […]

Read the full article

IT Skills and Cyber Insurance Underwriting: A Winning Combination

June 14, 2016

In October 2015, the Insurance Information Institute (III) released a white paper entitled “Cyber Risk: Threat and Opportunity,” which stated that the number and impact of successful data breaches continues to rise. This is driving increased adoption of cyber insurance in an attempt to reduce risk. $2 billion was spent on cyber insurance in 2014 […]

Read the full article

Cyber Security: How to Ensure Your Risk is Reduced on Payment Gateways and the Cloud

March 28, 2016

The ability to accept online payments for goods and services is generally considered a good idea for businesses of all sizes, allowing transactions to take place when the buyer is not physically present. Obvious benefits include convenience, the ability to purchase from any Internet-ready device, and no requirement to travel to the store, which translates […]

Read the full article

9 Nontechnical Ways Hackers Secure Data

March 21, 2016

Considering an expensive technological upgrade to minimize the danger of a successful hacker breach? Think again! Installing all possible hardware and software upgrades will not protect your company from the human element. Your staff are a much more attractive target to cyber criminals and are hacked more easily than any technical restrictions present on your […]

Read the full article

Hiring Information Security Aware Workers

March 16, 2016

Today’s HR departments are faced with many challenges when it comes to selecting the correct candidate for an open position. Beyond the ubiquitous background checks, knowledge assessment and checking references, HR needs to take other factors into consideration to select the best candidate. Nowhere is this truer than in organizations looking to hire knowledge workers, […]

Read the full article

Job Seekers Must Leverage IT Security Concepts to Score a Position

February 23, 2016

Job seekers often face near insurmountable tasks when securing an interview for positions that are data intensive and bound by compliance laws and regulations. Nowhere is this more evident than in the financial, healthcare, insurance, and banking markets. All of which hold data governance in high regard and seek to protect both intellectual property and […]

Read the full article