How Do I Ensure My Business Communications Don’t End Up In The Wrong Hands?

How Do I Ensure My Business Communications Don’t End Up In The Wrong Hands?

Communication is one of the most important key aspects of any properly functioning company or organization. While communicating via telephones and word of mouth are reasonably satisfactory ways of sharing information, organizations today rely on email as a principal method of communicating with staff members, partners and clients. Your email infrastructure plays a vital role...

avatar
Duleep Pillai
June 4, 2014
Discover More
How Do I Ensure My Business Communications Don’t End Up In The Wrong Hands?

CUPID —The New Heartbleed

The Heartbleed SSL Bug, one of the most serious vulnerabilities to ever hit the Internet,caused problems for enterprise wireless and wired networks about two months ago.  Since then, it has been patched and dealt with.  Or so we thought.  Now, a similar vulnerability is causing problems — CUPID.    CUPID uses the same exploit as...

avatar
Duleep Pillai
June 3, 2014
Discover More
How Do I Ensure My Business Communications Don’t End Up In The Wrong Hands?

Did You Know? Most Security Threats come from inside your company network

Today’s rough economy is forcing businesses to downsize their workforce. Now that there are fewer employees, more important information is distributed to each individual. If too many employees have access to sensitive assets, there is more potential for unauthorized action. The first way to prevent internal threats is to limit which employees have authority to...

avatar
Duleep Pillai
June 2, 2014
Discover More
How Do I Ensure My Business Communications Don’t End Up In The Wrong Hands?

Keylogging and HIPAA Breaches. What’s Hiding In Your Computers?

The University of California, Irvine Student Health Center has been the victim of a HIPAA breach.  Nearly 2,000 pieces of PHI (protected health information), including financial data, were stolen via a keylogger attack.  The keylogger collected this information for over a period of a month before being discovered. How This Happened.  The keylogger was residing...

avatar
Duleep Pillai
May 27, 2014
Discover More