data security

big brother

Corporate Governance in the Era of the NSA

Many of us knew before the Edward Snowden revelations that the government's reach is long, but when it was made clear just how much they truly have access to, it's fair to say that there were chills all around. Regardless of industry, organizations have a responsibility to protect consumer, patient or user data. If we don't know ...

file sharing

Avoid Data Leaks: Make Content Sharing Safe and Compliant

There’s risk enough when information is housed in a single location, but when data is shared between multiple devices – and particularly when files are transferred online – maintaining security becomes far more complex. Follow this guidance when choosing a file-sharing solution for your firm.

target on chest

Protecting Yourself Against Data Breach: Don’t Be a Target

The data breach at Target last November has been widely publicized and widely criticized. The corporation was aware of intrusions in its software, but failed to respond. And the results for the company – one of the nation’s largest retailers – have been disastrous, as evidenced by the tens of millions of dollars the company has already ...

privacy policy

Protecting Proprietary Information

This scenario is built from a real-life experience working for a high-tech company, but it can apply to any organization or situation you might be facing. Apart from tangible physical assets, if we own intellectual property or proprietary information, this issue is relevant.

coded key inserted into binary code

Encryption and the Payment Ecosystem

The everyday consumer assumes that when they make a purchase, either online or in the checkout line, their card data is handed off to a trusted source, with security in place to protect them.