In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that…
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…
You’ve probably heard about the importance of business continuity and disaster recovery. Today, more businesses have business continuity plans than ever before. With so many businesses looking to secure their…
Over the next few weeks, I will be releasing a series of articles covering the value of data analytics and insight, focusing on five of the key business drivers that…
In my recent post 5 More Ways I Can Steal Your Data – Work for You & Stop Working for You I started telling the story of a security guard…
I’ve spent countless hours trying to find the perfect tool for the job. In fact, I’ve spent more hours searching at times than I have doing the work. You’ve probably…
“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber,…
Active Directory, commonly known as AD, can be considered the heart of the IT infrastructure. It holds user account information, computers and servers, provides authentication and certificates. It even has…
Welcome back. Last time we met, I reiterated the importance of a good SQL Server monitoring solution, and not just monitoring, but monitoring intelligently. We also went over ways to…
Email is the lifeline for almost every business in this world. When email is down businesses cannot communicate. There is loss of productivity, which could lead to dollars lost, which…