Most people imagine a hacker to be someone at a keyboard late at night, guessing passwords to steal confidential data from a computer system. This type of attack does happen but it makes up a very small portion of the total network attacks that occur. Today, worms and viruses initiate the vast majority of attacks
Did you know that on average employees spend 20 – 25% of their time using the Internet for non-sanctioned purposes? In a tough economy the last thing we can afford is to have productivity decline or have our network infected with unexplained spyware and malware. Even just an hour a day of non-business related use
Simply having a daily backup on tape leaves too much at risk. Tape backups are, simply put, not reliable. Every company should perform off-site data backup and storage. With tape backup, companies need to store the tapes in an offsite location that is secure and accessible, while disk systems need to have an off-site
Ensuring that sensitive information, such as customer or financial records, not only remain protected during a crisis, but are also accessible following a crisis, is critical to a well organized disaster recovery plan. All organizations should have a viable and tested data protection strategy. Here are 5 steps to successful disaster recovery planning: 1) Devise
The real solution starts with understanding both the threat and the tools is the first step to upping your Security IQ.