What is HTTPS and Why Should You Care?

It’s known as many things – HTTPS, the lock icon in the address bar, an encrypted website connection.  Although it was once reserved primarily for passwords and other sensitive data, the entire web is gradually leaving HTTP behind and switching to HTTPS. So what does it mean?

Passwords For Primary Protection Are No Longer Valid. Now What?

If you tend to use the same, or similar, passwords for more than one site, or if a password is your only tool for credentials and authentication, you could be putting your organization – and yourself – at risk for identity theft and/or a security breach.

Best Practices to Avoid Insider Threat

Best Practices to Avoid Insider Threat
All companies must use the best practices to avoid insider threat from taking place and know how to avoid situations involving accidental or a malicious rogue employee or contractor. According to Verizon’s 2015 Data Breach Investigations Report, 50% of all security events are caused by a company's own employees.

12 Tips For Your Data Security Plan

Did you know that 90% of the 5,500 small, medium and large companies surveyed in 2015 experienced at least one security incident? Having a data security plan in place is of utmost importance to every business.

With all the personal and corporate data provided by clients, customers, and employees, it is of crucial importance that businesses have security measures in place to protect this sensitive information.

Protect Yourself and Your Business Against Identity Theft

Identity theft can happen to anyone, at any time. It is a common crime in today’s hyper-technology world. Hackers are coming up with new ways to steal your information at a rapid pace. You could be the average Joe on the street who accidentally gives your credit card information to a cloned PayPal, or someone steals your driver license’s number and applies for credit cards under your name.