Posts Tagged ‘protect’

 

Executives tell Employees – It is OK to lose your phone

These days, employees’ phones contain your company’s sensitive data. Sure, IT can wipe the data off of the phone remotely, but ONLY when the employee notifies someone that they lost their phone. What happens is the users do not notify IT, and the lost phone still contains the sensitive data. To solve this problem…
Continue reading ‘Executives tell Employees – It is OK to lose your phone’


Are you rolling out the welcome mat to attackers?

One of the biggest surprises IT receives during an audit is that their network is basically configured to grant attackers access.
Continue reading ‘Are you rolling out the welcome mat to attackers?’


Be sure to enable device tracking on your mobile devices

Someone stole my iPad. In November I realized my iPad was suddenly missing. Apple’s Find My iPhone showed the device to be in a parking lot just outside of a transportation company’s main office —I used the transportation service late the night before.
Continue reading ‘Be sure to enable device tracking on your mobile devices’


A surprising way employees steal from you

Our CSI and physical security auditor knows that one of the most common ways employees steal from businesses is to throw something valuable in the trash.
Continue reading ‘A surprising way employees steal from you’


The importance of physical security audits

In addition to IT security audits, many organizations are also required to perform physical security audits as well.
Continue reading ‘The importance of physical security audits’


Should you block your employees from accessing social media?

In the past, I’ve been known to instruct companies to block all employees from social media. Times are changing.
Continue reading ‘Should you block your employees from accessing social media?’


For traveling users, wireless 3G is better than hotels

From the standpoints of speed, cost, and security, you may find that providing a Sprint, AT&T, Verizon, or T-Mobile wireless connection will be much better than using hotel provided Internet services.
Continue reading ‘For traveling users, wireless 3G is better than hotels’


A data backup strategy for your company

Backup problems continue to plague businesses. One of the biggest problems happens when you attempt to restore and find out your backup is no good. For the past few years, business continuity devices have emerged to ease the pain of backups.
Continue reading ‘A data backup strategy for your company’


Follow these 7 steps when you buy a new computer

* Read the updated version of this blog post.

Executives often want to know what steps to take when they purchase a new computer.

Continue reading ‘Follow these 7 steps when you buy a new computer’


Can you trust your IT professional’s answer?

I had the pleasure of performing an audit at a company recently where the lead IT professional was shocked to learn that his e-commerce system needed to be secure in order to keep credit card information secure as part of PCI-DSS compliance.

Continue reading ‘Can you trust your IT professional’s answer?’