Blog

Home  Blog

10 Tips to Keep Personal Data Safe and Secure

Security should always be on your mind when online. Whether at a larger organizational level or at an individual level, you should always have at least some way to keep your data safe. And the more data you must protect, the more important the act of data protection becomes. You should be asking yourself how […]

Explore More

17 IAM Interview Questions and Answers

The job market for identity and access management professionals remains strong, but to ace the interview and get the job, you must be prepared for some tough IAM interview questions. Some organizations are looking for IAM analysts to oversee day-to-day operations; others are in a building phase and need IAM engineers and IAM architects. But […]

Explore More

3 common election security vulnerabilities pros should know

It’s important to find the silver lining in any negative situation — and this continues to ring true during a global pandemic. As we approach the always-competitive U.S. election in November, politics aside, there is a silver lining there, too. This year, even with COVID-19 concerns increasing the adoption of mail-in voting and chief election […]

Explore More

Mobile device convergence brings security challenges

The sting of the COVID-19 global pandemic forcing many into remote work — combined with the trend of BYOD in the enterprise — is changing the dynamic of the mobile device convergence. The concept of digital and technological convergence, combining the computing power of a desktop, a smartphone and a tablet into one device, goes […]

Explore More

How security champions can help, despite working remotely

A security champions program is critical to maintaining an organization’s security culture, but during the COVID-19 shutdown, teams could find themselves working with one hand tied virtually behind their backs. Telework arrangements, online meetings, collaboration software and extensive smartphone use can keep an organization running, but they can’t recreate the casual interactions that are an […]

Explore More

What cybersecurity teams can learn from COVID-19

There’s a reason why a computer virus is called a “virus,” as they have many similarities to medical viruses. Notably, as medical viruses can have a severe impact on your personal health, a computer virus can severely impact the health of your business. In today’s digital world, a computer virus, a “wormable” remote code execution […]

Explore More

Security issues with working remotely (and how to fix them)

Having employees connect remotely to your corporate network is not new. Most companies use cloud-based software-as-a-service (SaaS) applications and have some virtual private network (VPN) or remote desktop capabilities to enable field sales staff or roaming users to connect to essential applications and data. However, few — if any — companies were prepared for our […]

Explore More

Invest in new security talent with cybersecurity mentorships

What do NVIDIA’s Jensen Huang, Salesforce’s Marc Benioff and Microsoft’s Satya Nadella have in common? They were all deemed the greatest business leaders of 2019, according to Harvard Business Review’s “The CEO 100” list. But another commonality they share is that each have had mentors to help guide them through their careers in technology and […]

Explore More

6 key identity and access management benefits

Years ago, when users required access to a specific system, application or other corporate resource, they were provided a username and password tied to the access level they needed. While this was a viable option when the number of IT services was small, it didn’t take long before the number of accounts a user had […]

Explore More

Who’s to blame for ransomware attacks — beyond the attackers?

In early May, hackers infiltrated the Baltimore, Md., computer network. The ransomware attack ended normal business operations, interrupted critical city services, cost the city millions and inconvenienced hundreds of thousands of residents. Baltimore joined the list of other cities that have fallen victim to serious ransomware threats that affect business and commerce. While ransomware attacks […]

Explore More

Let’s Work Together!
Just Drop Us a line - [email protected]

Subscribe to our Newsletter

copyright 2024 by Digital Creations LLC