Blog Written by: Danish Wadhwa from www.flydot.biz
Blog Written by: Danish Wadhwa from www.flydot.biz
Topics: Cloud Computing, Cloud Security
Written By Guest Blogger: Caroline Black
We have entered the world of the flexible workforce. More and more companies, and people, are turning their backs on the way we used to work. There are great benefits in working from home or allowing employees to do so, for both the employer and employee. These include reduced overhead costs, increased engagement and improved productivity, to name a few. However, having even just one remote worker can expose a company to a wide variety of previously unknown security risks.
Topics: Mobile Device Management, cybersecurity
NSK’s new product BitHawk is a new cyber defense application that picks up where your antivirus solutions leave off. It provides our customers with powerful, efficient protection and system clean-up capabilities.
Below is an example of how it found an app on one of our Clients phone’s that was connected to Chinese adware/spyware servers and collecting data from the person’s phone.
Topics: cybersecurity
The internet has become an indispensable tool for everyday life, both personal and business. Its global use and familiarity have also opened the doors for cyber criminals to take every opportunity to exploit vulnerable people through disturbing online attacks. Online scams and malware are also becoming increasingly sophisticated, and while many of us are aware of what to look for and what to do when they arise, there are some that may still be confused by the latest scams discussed in the media.
Topics: cybersecurity
In February 2010, Massachusetts raised the bar in security for businesses keeping it's residents’ information, by creating the most comprehensive data protection and privacy law in the United States – 201 C.M.R. 17; also, known as the Standards for the Protection of Personal Information of Residents of the Commonwealth. This regulation issued by the Department of Consumer Affairs requires all businesses that license or own personal information of a Massachusetts resident to comply with the minimum-security standards set forth in the regulation.
Topics: 201CMR17.00, cybersecurity