Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality Regulatory compliance.  We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight.  Why? It is complicated and expensive and they...
What Does Your Employer Know About Your Daily Activities

What Does Your Employer Know About Your Daily Activities

What Does Your Employer Know About Your Daily Activities How much does your employer know about your personal life? Maybe more than you realize. When you use your personal devices to access company servers they can log your activities. Then they can track when you log...
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database

Privacy Gone: Tech Start-up Has Huge Facial Recognition Database

Privacy Gone: Tech Start-up Has Huge Facial Recognition Database   What if I told you that there was a biometric artificial intelligence program that might end privacy as we know it… would you believe me?  What if I told you that the company that developed it was...

Security First, Apple Stands Ground on iPhone Encryption

Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private.  To do that they use a proprietary encryption system. While there have been private companies who have tried to...
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After Today Are you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...