Successful cloud migrations can create an edge
Moving to the cloud can be daunting but that should not stop you from considering this transition. It is no longer a dilemma of whether you should go to the cloud or not,...
Why security audits should be done externally
While nobody likes conducting audits, everyone understands the benefits regular assessments can provide your organization concerning information governance, assessing ris...
Are phishing attacks targeting your business?
Phishing attacks are nothing new to the business user.
Emails promising the riches of Nigerian princes. Poorly worded messages asking you to click on a provided link. De...
Securing your remote workspace and workers
The remote workspace has changed dramatically. It’s quite ‘normal’ for remote workers to have virtual drinks on a Friday afternoon as it’s common to see kids pop into vid...
Pay attention to your critical communications
Would you do your taxes on 3-lined paper? Or fill out legal documents with a crayon? Or write your bank account information on the outside of your deposit envelope?
You ...
The importance of cleaning your digital records
There’s a trend of home organization and decluttering projects happening right now. Before and after photos of freshly decluttered pantries, offices and closets have been...
New workstyles demand new security awareness
By Kerry Cole
It is more important than ever that employees understand the significance of information security and the part they can play in reducing the risks to sen...
Data deployment: One size never “fits all”
By George Dearing
We've gone data crazy. Data lakes, dark data, data scientists — anything that helps us conjure up insights from our information is, well, big. But ther...