Macs in the Enterprise: How to Secure Data at Rest

Macs in the Enterprise: How to Secure Data at Rest

Data at rest refers to all data stored on devices that are not transferred from network to network or device to device. It includes data saved locally on computer hard drives, archived in databases, file systems, and storage infrastructure. Since it does not travel...
Scaling down your business? Put security first

Scaling down your business? Put security first

Circumstances might see you purposely shrinking your business footprint. But, as you create a more efficient business profile, don’t neglect security of your IT systems or services.So, maybe pressure on margins saw you bring your small business back home. Maybe you’ve...
Phishing through e-mail marketing services

Phishing through e-mail marketing services

To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable. Scammers have used various tricks over the years to bypass antiphishing technologies. Another scheme with a high success...