Jul 23, 2018

chacko

Clients, Security

0

Part 2: Building an Armored Laptop. An earlier post— The Mobile Worker’s IT Bill of Rights– summarized what is desired from secure mobile computing for corporate workers on-the-go. Any, every enterprise will benefit from lessening the burden placed on mobile workers to protect the devices that they cart around—primarily laptops—containing corporate, customer and regulatory data. […]

May 14, 2018

chacko

Uncategorized

0

What is Your Privacy Data Wrangling Lasso Made From? Information that contains privacy data is scattered far and wide in your enterprise network. Corralling all of this privacy data from disparate locations– enterprise desktops, laptops and from shared locations– is a big challenge. Here are some common and uncommon locations: File systems are a pack […]

May 03, 2018

chacko

Uncategorized

0

GDPR – Which Road Will You Be Taking? As a small business with customers in the EU, we are all keenly aware that the May 25th deadline to comply with GDPR is fast approaching. The question is: how do we get there?   One approach is to throw technology at the problem. Technology in the […]

May 18, 2017

chacko

Uncategorized

1

No, I don’t WannaCry! You’re probably overloaded by now by the torrent of information that’s been directed at you regarding the WannaCry ransomware events over the past weekend. Has the stream of platitudes regarding hygiene practices when it comes to one’s own laptop—keeping Windows patches up to date, making regular backups of one’s data, and […]

Nov 28, 2016

chacko

Security

0

INTRODUCING THE SMALL BUSINESS CYBER PROTECTION FOOD PYRAMID   Small businesses lack the wherewithal for fine dining when it comes to IT and cybersecurity spending. We’re wise in the way that we spend our money, and, so, we eat at the local fast food restaurant, using what’s remaining in our wallets to build and grow […]

WHAT DOES IT TAKE A SMALL BUSINESS TO ESTABLISH A CYBERSECURITY PROGRAM?   Why are small businesses wary of establishing a cybersecurity program? There is no simple answer, but we’ll briefly examine the reasons and suggest a way forward to protect their intellectual capital. Some of the factors that affect and effect such decision making […]

Aug 18, 2016

chacko

Security

0

GRANULAR, YET, HOLISTIC SECURITY For Security, at SecureFLO, we recommend our clients start by building a strong foundation of risk frameworks and templates. This is achieved through the implementation of security policies and procedures, and secure software development within technology operations. We would cap it with the continuous monitoring of activities: systems, application, users, which […]

0
0
without
https://www.secureflo.net/wp-content/themes/blake/
https://www.secureflo.net//
#50CCB3
style1
paged
Loading posts...
/var/www/html/
#
on
none
loading
#
Sort Gallery
https://www.secureflo.net/wp-content/themes/blake
on
no
off
Enter your email here
off
off