Blog Archives

Lawyers and Email: Ethical & Security Considerations

By Scott Aurnou The specter of attorney-client privilege has a long and well-respected history in litigation… but means nothing at all to a hacker. “Delete this email if you are not the intended recipient” or similar language theoretically sounds imposing,

Share Button
Tagged with: , , , , , , , , , , , , ,
Posted in Cloud Security, Laptops & Desktops, Network Security, Privacy Issues, Smartphones & Tablets

What Is the Internet of Things (and What Risks Come with It)?

Computer Security Tip of the Week Scott Aurnou – The “Internet of Things” has become an increasingly popular buzzphrase. What is it and what risks can it pose to your safety? Webpages referenced in this video include: Secure Your Wi-Fi

Share Button
Tagged with: , , , ,
Posted in Cloud Security, Network Security, Security Tip of the Week

Cloud Computing Security Needs: 7 Steps to Migrate to the Cloud

By Gilad Parann-Nissany In 2008, the size of the cloud computing industry was $46 Billion. That is more than the GDP of Costa Rica! Think it’s a lot? Ready to jump on the cloud security bandwagon? That was 2008! In

Share Button
Tagged with: , , , , , , , ,
Posted in Cloud Security, Guest Posts

5 Cloud Encryption Tips

By Gilad Parann-Nissany A day doesn’t go by when we don’t hear about sensitive information being exposed or stolen. The culprits could be the government, professional hackers, careless employees with data on mobile devices, or internal employees with unauthorized access

Share Button
Tagged with: , , , , , , , ,
Posted in Cloud Security, Guest Posts

HIPAA and the Cloud: Securing Patient Data

By Gilad Parann-Nissany The Health Insurance Portability and Accountability Act (HIPAA) has been around for many years with the main purpose of governing the use and disclosure of individuals’ health information. The recent dramatic trend of healthcare-driven companies to migrate

Share Button
Tagged with: , , , , , , , , , , ,
Posted in Cloud Security, Guest Posts