In today’s digital age, technology is rapidly advancing—making it easier for federal government agencies to better serve their constituents and assist their internal workforces in streamlining and facilitating agency workflows and processes. However, these technological leaps have created a massive…
Mobile devices – convenience, security risk or both?
Cell phones, tablets, wearables and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may…
Ten steps to avoiding ransomware
Recently, 22 different cities across the State of Texas were hacked and hit with simultaneous ransomware attacks – attacks where computer systems or data are effectively held hostage for a monetary ransom. And Texas isn’t the only victim. According to…
Security and compliance – they’re not the same thing
News Flash: Being compliant doesn’t mean you’re secure, any more than implementing security guarantees that you’re compliant. That’s right, compliance does not equal security. Compliance and security are separate and distinct goals. So, what is the difference? Compliance requires that you meet…