Pass on Words for Passwords

Today’s technology gives companies access to infinite data. They can pay bills as well as invoicing customers, and manage all financial records and banking online. Everything, from an announcement for the next team meeting to highly classified information, can be organized and filed both on-premise and in the cloud for [...]

Is Your Security Blanket Tucked In? Part II

Last week’s blog established the critical aspect of policy setting and governance. Today we will continue with the remaining two principles of a strong cyber security within your company – building a strong IT and training your staff. Combining these with your policy setting and governance will create a strong wall [...]

Is Your Security Blanket Tucked In?

With the rapidly increasing technologies, digital presence, IoT, mobility, etc., cybersecurity continues to be a top priority for business. Data breaches, ransomware, spear phishing, etc. are an ever-increasing threat. Approaching data security effectively requires a game of balancing risk management against resiliency, implementing methods that companies to address security prevention [...]

How Strong is Your Application Management?

Successful Application Management (AM) is the process of managing the operation, maintenance, versioning and upgrading of an application throughout its lifecycle. It is a method of IT governance that focuses on setting optimal procedural and performance standards, while integrating both IT and business AM objectives. Successful AM centers around best practices, techniques, and procedures, which [...]