Business Growth: Technology

Biometrics

Are biometric authentication methods and systems the answer?

Are biometric authentication methods and systems the answer? Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access…

keyboard

It’s time to go on the offense with your IT security

Cybersecurity is now a game of attack, not defense It’s said that the best defense is a good offense. This is particularly true in cybersecurity, where the average cost of…

1.4 BILLION STOLEN

A massive repository containing more than 1.4 billion stolen credentials was found on the dark web with special features for malicious actors.

by Peter Loshin, Site Editor SearchSecurity, Published Dec. 12, 2017 Researchers found a massive repository of cleartext stolen credentials on the dark web that is the largest of its kind….

Data Privacy Logo

HEALTHTECH AND SECURITY: SHARING AND SAFEGUARDING PATIENT DATA

Empirical data confirms that the healthcare sector should be paying more attention to security-related risks, not less. Over the last three years, cybercriminals have been increasingly shifting their focus to…

Dynamic Blog photo 2

Are separate administrator accounts a good idea for enterprises?

Separate administrator accounts are becoming a normal part of access policies in enterprises. Expert Matthew Pascucci explains why this is a good idea and how to implement it. I have…

cloud image

Is it safe to store corporate information on Google Drive (or similar services)?

BY JOSEP ALBORS When it comes to storing a company’s confidential information and/or backing it up, various questions tend to come up with regard to the location where this storage will…

simon

For Recruiting Firm, APT Blocker Is Best Candidate for the Job

Case Study With lots of threats around on the Internet and staff who are recruitment consultants first – and not IT security experts – we wanted to make sure that…

Future of management photo

What’s the future of management?

Business management in the digital age When automation transformed the manufacturing sector across the Western world during the 1980s and ‘90s, many white-collar workers were nonplussed at the wave of…

Hacker

Keeping business laptops secure

Keeping business laptops secure When it comes to notebook computers, their greatest strength can often seem to be their most profound weakness. The very portability that makes them such useful…

Irene Haws

Human behavior can be the weak link in your cybersecurity

By Irene Haws, Dynamic Computer Solutions of Topeka, Inc. Human behavior can be the weak link in your cybersecurity. It is important to provide training for your employees to recognize…