What is the Difference Between HTTP and HTTPS?20130322103657
What is the Difference Between HTTP and HTTPS?
March 22, 2013
Before jumping into HTTPS, let’s first discuss what the acronym HTTP stands for. HTTP, HyperText Transfer Protocol, is a...
How to Successfully Manage BYOD Security20130321105650
How to Successfully Manage BYOD Security
March 21, 2013
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of co...
Protecting Your Company After an Employee Leaves20130315131127
Protecting Your Company After an Employee Leaves
March 15, 2013
When an employee leaves a company, especially on bad terms, there’s always a risk that they could try to negativel...
What if your Security is Breached? 3 Lessons Learned20130228123319
What if your Security is Breached? 3 Lessons Learned
February 28, 2013
You had backups to your backups, plans in place, and security that you had faith in. But it still happened. Your systems...
5 Things to Consider When Choosing a Secure File Sharing Provider20130220123828
5 Things to Consider When Choosing a Secure File Sharing Provider
February 20, 2013
Has your office been thinking about secure file sharing lately? Whether it’s because of the constant stream of new...
Building a Relationship with your IT Department20130212100341
Building a Relationship with your IT Department
February 12, 2013
Working in an IT department can sometimes seem like a thankless job. Think of the last time you reached out to your IT p...
5 Ways to Protect Yourself Online20130208141224
5 Ways to Protect Yourself Online
February 8, 2013
With data breeches being reported at an alarming rate, it’s important to take stock of how you protect your identity onl...