Are Your Remote Employees Embracing a Culture of Security?

While the world holds its breath for COVID-19 to run its course, many tech workers are out of the office, yet because they are able to work from almost anywhere, it’s still business—just not as usual....
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up i...
Read more

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analys...
Read more

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our cl...
Read more

TLS: Too Little Security

This article assumes basic knowledge of SSL, TLS, and how those support secure web browsing. For a thorough overview or just a refresher, check out this resource. Around the turn of the century, some ...
Read more

The Two Network Security Tools Your Mid-Sized Business Needs

Encryption and authentication — let's learn more about why your company needs these security tools. Because IT staff and resources are often sparse within mid-sized businesses, they see the public clo...
Read more

Automating Data Protection Across the Enterprise

Introduction With the unabated growth of the internet, companies are being challenged to protect unprecedented quantities of data from determined and targeted attacks. While security regulations manda...
Read more

The Two Most Important Steps to Keep Your Data Secure

Although we all recognize that keeping our data safe is important and encryption is something we've probably heard about, how many of us really understand what that means? I know I'm learning more eve...
Read more

Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more in...
Read more