Category: Security

author:

Security

Data Security and Privacy Techniques for Everyone

June 17, 2020

Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to protect their data. If you’re online in any capacity, there are some basic techniques you …


author:

Security

Four Strategies for Securing the Tactical Edge

June 9, 2020

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But …


author:

Security

Ideas for Combatting DoD Mobile Security Threats

June 2, 2020

In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for hackers. According to research by Wandera, in 2018 there were 455,121 mobile phishing attacks, …


author:

Security

Improving Cybersecurity Starts at the Endpoints

May 26, 2020

Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to prioritize thwarting industrious hackers who are intent on getting to the treasure trove of …




author:

Security

Breach Data Trends: October 2019 to March 2020

May 6, 2020

Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October 8, 2019, research from SpyCloud—our partner in delivering Identity Monitor—has uncovered over 630 million …


author:

Security

Solving the Contractor Breach Challenge

May 5, 2020

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed by contractors. According to our Federal Cybersecurity Survey Report from last year, more than …


author:

Security

Securing a Tide of the Internet of Things

April 21, 2020

IoT has the potential to offer state and local municipalities real and tangible benefits for their citizens. The IoT is already powering smart city efforts throughout the country, through things like smart grids, automatic flood detection, and more. The city of Chicago alone has …


author:

Security

The Top Five Security Fails in Every Data Breach

April 20, 2020

If your company hasn’t had a data breach, it’s only a matter of time until it happens. Unless you begin to make a big investment in security, have regular audits and penetration testing, and instill a culture that values customer data, breaches are bound …