Security

What is the Weakest Link in Network Security?

The landscape of network security and criminal behavior continues to evolve at an astonishing rate, and for the average company this is going to mean at least a handful of risks that must be addressed immediately. For those that have taken all of the traditional steps for protecting their network and their company's information, it may be surprising to hear that they still have vulnerable points in their system. Within most companies, the number one threat is not going to be a dedicated attack against a firewall or a backdoor hack into one's software, it is going to be the authorized users themselves.

BYOD Red Alert: Employees are Your Biggest BYOD Security Threat

With news of security breaches happening at major corporations all over the world, it’s easy for business leaders to start focusing all of their attention on outside threats. Hackers seem to be everywhere these days, so a strategy that heightens network security against cyber attacks is usually a good idea. If your business has adopted bring your own device (BYOD) policies, however, all that preparation for avoiding outside risks may be misdirected.

6 Ways Small Businesses Can Improve Network Security

It’s amazing the influence technology has. All these new gadgets have made our lives easier in so many ways, but they have also dramatically changed the cultures that embrace them. For example, digital theft is becoming a more common threat than physical theft.

We’ve heard examples of large corporations having their customer information hacked, or even celebrities having their personal photos stolen. And while we think criminals would only go after the big guys, small businesses aren’t in the clear. Without massive IT budgets and industry professionals, their networks are often left unprotected and become easy targets for intruders.

Drupal Security: Not Shocking but Responsible

Over the years, I've made it an unwritten policy not to sensationalize bug fixes and security vulnerabilities in content management systems. While there may be great interest in such stories, I believe such stories have a tendency to cause more harm than good. When sensationalized, such articles tend to cause customers to address security concerns with emotion instead of logic which is never a good thing. So, when the security vulnerability known as "Drupageddon" broke and Drupal developer Bevan Rudge posted "Your Drupal website has a backdoor", I knew this story was going to eventually reach mainstream media.

BYOD vs. COPE: The Fight Over Freedom and Security

One of the biggest trends from just the past few years can easily be summed up through the letters BYOD. Bring Your Own Device policies have been all the rage among companies looking to increase employee productivity while also saving on costs, and it’s a trend that doesn’t appear to be slowing down. According to Gartner, about half of companies will have some sort of BYOD program in place by the year 2017. But all is not sunshine and rainbows for the relatively popular BYOD movement.

How Companies Can Get a Handle on BYOD Security

The way businesses operate has certainly changed with the rise of new technology flooding the workplace. Perhaps one of the most significant developments in the past few years has been the increased use of personal devices in the office. As smartphones and tablets have become more affordable and their capabilities have multiplied, more workers are bringing their own devices to help them with their jobs. According to one recent survey from Webroot, employees at more than 60% of companies use their own devices at work.

The Biggest BYOD Security Threats and How to Avoid Them

With Bring Your Own Device (BYOD) programs likely here to stay, companies are trying to find ways to reap the most benefits while downplaying the drawbacks. While it’s true that BYOD policies can lead to increased productivity, more employee satisfaction, and greater collaboration among workers, some significant issues have arisen in recent years. At the forefront is the concern over having a BYOD security plan, and since under a BYOD policy employees would be using their own personal devices to access company networks and data, business leaders are finding it an issue they need to address quickly.

5 Predictions: What the Future Holds For CRM Systems

When it comes to tools that can help businesses reach out to more and more people, customer relationship management (CRM) systems are some of the most important currently being used. In a nutshell, CRM systems help companies keep track of customer information, with automation and organization of data being crucial elements of the software. As technology has evolved, so have CRM systems. Every year brings about new advances, and businesses have needed to adapt to keep up with all the changes. Predicting what’s to come can help organizations prepare in advance. As companies look to the future, they’ll notice several trends that they can be ready for well ahead of the rest of the pack.

Protecting Your WiFi Network From Hackers

It may come as a bit of a shock, but many people simply don’t have security on their minds. With all the stories concerning major security breaches of large corporations like Target and Home Depot, businesses are definitely paying attention, but many private individuals don’t look at data security as a top priority. Even some smaller companies, while focusing on security for sensitive information, may unwittingly engage in practices putting that data at risk. One particular point of emphasis is the WiFi network.