Posted by & filed under Security.

The countdown is on! The Rochester Security Summit is 26 days away, and this is the first edition of Rochester Security Summit Thursday. Every Thursday until the event, we’d like to give you a bit of what conference attendees will experience. First, let’s talk about the theme of this year’s event. The theme of this… Read more »

Posted by & filed under Uncategorized.

Smartphones have now overtaken laptops as the most popular means of accessing the Internet – up to two hours per day, according to Ofcom. Not surprisingly, hackers continue to attack mobile devices at a staggering rate. In fact, experts recently revealed that 95 percent of all Android smartphones can be exploited with a single text message from… Read more »

Posted by & filed under Security.

Last year was dubbed the “Year of the Data Breach.” Every day, news outlets reported data, dollars and more was lost by the millions. According to a study done by Ponemon Institute in 2014, 43 percent of companies experienced a data breach, which is up 10 percent over the previous year. The trend line is… Read more »

Posted by & filed under Security.

“Limitless paper in a paperless world.” It was a fictional tag line, for a fictional ad from a fictional company (if you’ve seen the television show The Office, you’ll know the reference). But, the fact of the matter is, a lot of industries are still paper-intensive. Healthcare, government and financial services are three of the… Read more »

Posted by & filed under Security.

This cyberwar has come a long way, on both the offensive and defense side. As threats have evolved, so have the strategies and tools of the hackers. On the other side, businesses continue to use innovative technology solutions to protect their company from cyber security intrusions, protecting their bottom line and assets. While it’s great… Read more »

Posted by & filed under Security.

Data breaches and the havoc they wreak is commonplace, and it’s not slowing down. Savvy criminals are using advanced technologies to target networks that are vulnerable and ripe for the taking. And while it is a serious situation, we agree with our friends at McAfee. “With certain smart network changes and a healthy-dose of ‘knowing… Read more »

Posted by & filed under BYOD.

“You are the company you keep.” We’ve all heard the expression before, and it’s a phrase that originated from Bible scripture. The message is simple: Be careful who you surround yourself with, because they will shape you into who you are. It’s a message that carries over well to the data-protection and cyber-security world that we live… Read more »

Posted by & filed under Security.

Earlier this month, Illinois-based Trustmark Mututal Holding Company fell victim to a software error that resulted in emails containing personal information being sent to the wrong insurance carrier clients. The information includes names, social security numbers and payroll deduction information. After contacting each insurance carrier recipient and confirming its deletion, it is believed that misuse… Read more »

Posted by & filed under Security.

We’ve all made the mistake. The dreaded “Reply All” button response that was meant for one person but sent to the entire office. Mistakes happen and a small one like that is nothing to fret over, other than the potential awkward conversation in the hallway. Of course, there’s always the bigger mistake. Sharing sensitive company… Read more »

Posted by & filed under Security.

Written by Sean Fitzpatrick, Managed Services Specialist Independence Day gave all of us an opportunity to reflect on America’s past and look forward at what is to come. Throughout our history, we’ve seen many different types of breaches to national security, from the British landing on Staten Island in attempts to destroy George Washington’s army… Read more »