Posted by & filed under Security.

Homer Simpson’s catch phrase is one, simple word: D’oh! And no better word could sum up how we’re feeling after reading SplashData’s annual list of worst passwords of the year. In fact, if people were smart enough to use D’oh as their password, it’d be more secure than about 99% of 2014’s worst. Most alarming,… Read more »

Posted by & filed under Security.

Homer Simpson’s catch phrase is one, simple word: D’oh! And no better word could sum up how we’re feeling after reading SplashData’s annual list of worst passwords of the year. In fact, if people were smart enough to use D’oh as their password, it’d be more secure than about 99% of 2014’s worst. Most alarming,… Read more »

Posted by & filed under Security.

Over the past month, we’ve discussed the importance of creating a security-centric culture, from the boardroom to the shop floor. Each blog had an underlying theme: Your company’s policies, procedures and employees need to have security’s best practices at the top of mind. And while it is natural for these discussions to start in your… Read more »

Posted by & filed under Security.

The Sony hack has been dominating news shows with a myriad of questions, including: Does this mean we lost our first real cyberwar? If a state sanctioned cyberattack was conducted on U.S. soil, how will we respond? Is this the wakeup call for the businesses and the United State Government to strengthen their cybersecurity? Sony… Read more »

Posted by & filed under Security.

Security is something we live every day. It’s what we do and it’s who we are. Understandably, security may not be your business, your expertise or your passion. But whether you’re a bank, hospital or a retail company it’s important to work towards building a strong security culture. It won’t happen overnight, and it’ll take… Read more »

Posted by & filed under Managed Services.

In our last blog, we talked about what is next in advanced authentication. We explored digital wallets, smartphones and one-time passwords. These are all innovative technologies that add an important layer of security to verification process. And although the logic behind implementing an advanced authentication technique seems obvious, it isn’t always easy to get it… Read more »

Posted by & filed under Security.

While it is a buzzword in 2014, enterprises utilizing advanced authentication methods, as an extra layer of security is nothing new. Employees need to look no further than their very own laptop. Over the past five years, many laptops have been built with an embedded biometric reader so employees can scan their fingerprint after typing… Read more »