logo

What To Do about Passwords in Your Disaster Recovery Plan

One post thread on Spiceworks caught my eye.  The Spicehead wanted to know what to do about passwords when it came to DR plans.  Was he supposed to put the passwords into it, or just what was he supposed to do with them.  Well, the first thing you don’t want to do is put them … Continued

2015 Cloud Security Survey: Security Concerns about Migration to the Cloud

Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, released the results of its global 2015 Cloud Security Survey that show that when it comes to migrating to the cloud, 65% of companies are concerned with security and 40% are concerned with their loss of … Continued

3 Lessons to Learn from Data Breaches of 2015

The year of 2015 became notorious for data breaches compromising on average more data than ever before. Any security breach is a result of security gap, negligence, or underestimation of human factor. Some of them could have been prevented, if employees had better followed security policies or organizations had taken minor security issues more seriously. … Continued

5 Jedi IT Security Tenets To Defend Against Data Breaches

Star Wars is not just a cultural phenomenon, it is a story that can be interpreted in many ways, even as a data breach case.  The everlasting battle between hackers and IT pros very much resembles the war between the light and the dark sides from the Star Wars movies. By learning from failure and success … Continued

Top 7 IT Security Threats for 2016

While the number of announced data breaches in 2015 is lower compared to 2014, the number of compromised accounts increased dramatically, exposing more personal data than ever before. Among the top causes is an increase in hidden attacks that use more advanced technics to bypass security mechanisms. In this article, we speculate on seven IT … Continued