Confidential Information Leaks and Your Employees20230805075104
Confidential Information Leaks and Your Employees
August 5, 2023
What is Information Leakage? An information leak is an event takes place when confidential information is revealed to un...
What We Learned at the Travel Health Insurance Association Conference 201720170524221643
What We Learned at the Travel Health Insurance Association Conference 2017
May 24, 2017
The THiA Conference this year was a blast and TitanFile was happy to be a sponsor and influencer at the event. Although ...
How to Build a Cyber Security Culture at Your Firm20170524213435
How to Build a Cyber Security Culture at Your Firm
May 24, 2017
Implementing a working culture of cyber security is difficult. Compliance is complex and rolling out a complete system a...
Ignorance is not bliss: Why you need a BYOD policy20130718112438
Ignorance is not bliss: Why you need a BYOD policy
July 18, 2013
Given the frequency with which it’s mentioned in the news, it’s not surprising that the practice of Bring Your Own Devic...
How Do You Communicate with Management About Cybersecurity?20130716131108
How Do You Communicate with Management About Cybersecurity?
July 16, 2013
Quartz shared a study this week on a pressing issue in the cybersecurity space – the inability of IT employees to commun...
How to Develop an Online Security Policy20130715090805
How to Develop an Online Security Policy
July 15, 2013
Before we dig in too deep, let’s start this blog post off with two questions: 1. Does your organization include staff me...
7 Things to Include in your BYOD Policy20130403123419
7 Things to Include in your BYOD Policy
April 3, 2013
Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While ...
Does my Organization need a BYOD Policy?20130402151728
Does my Organization need a BYOD Policy?
April 2, 2013
Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions o...
How to Successfully Manage BYOD Security20130321105650
How to Successfully Manage BYOD Security
March 21, 2013
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of co...