SaaS vs. On-Prem Data Security: Which is Right for You?
Published on May 17, 2023
via Security Intelligence As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations…
Five Minutes with ASPG President Cathy Thompson
Published on March 31, 2021
Since founding ASPG in 1986 with one product, Cathy Thompson and Lisa Hamilton have grown ASPG into a global software company. Today, ASPG offers dozens of products for z/OS and distributed systems and is proud to have partnerships with some of the most globally-recognized software…
The Future of Successful Remote Work
Published on May 12, 2020
The COVID-19 pandemic has presented a variety of challenges to everyday life. Now that restrictions are slowly being lifted and many of us are grappling with a new normal, we find ourselves asking what our new reality will look like, including the future of remote…
Most common security mistakes employees make
Published on December 4, 2014
Security software can keep data safe. Strong encryption and sophisticated access controls can keep data out of the wrong hands, but for the information in the systems to be useful, employees have to be able to access and manipulate it. The legitimate access granted to…
Protect Sensitive Data from Angry Ex-Employees
Published on August 14, 2014
Under ideal circumstances, when employees leave your company, it is on good terms and they are just going off to pursue other opportunities. There is typically a two-week notice period where the employee and company wrap up loose ends, where the employee provides summaries on…
7 Habits of Highly Secure Organizations
Published on July 15, 2014
Data security doesn't happen by accident. In a large organization, it comes from the combined efforts of a number of people within the organization working together to discover and address security vulnerabilities. The title of this post is obviously a play on the late Stephen…
DDoS Attacks: A Brief Primer
Published on July 2, 2014
DDoS attacks have been in the news and can make life difficult for companies. Here's a little background on these Distributed Denial of Service attacks to help keep you educated and up-to-date. A number of prominent companies have been recently hit by increasingly powerful DDoS…
Data backup and Disaster Recovery
Published on June 19, 2014
Properly encrypting and storing backups is essential for recovery from a system failure or massive data loss. While they have some similarities, data backup and disaster recovery planning require different tools and processes. The primary purpose of data backup is to make it possible to…
Password Reset Security — It Takes Two
Published on June 11, 2014
Users and employees are human, it turns out -- and forget or lose their passwords from time to time, making password resets an important part of any digital security system. But rather than taking up a significant amount of Help Desk employee time and operating…
Risks of Single Sign-on Password Systems
Published on June 3, 2014
Single sign-in (SSO) has some benefits -- and some attendant risks. Here are a couple of easy steps to making your company's SSO system more secure. Single sign-on (SSO) is a method of access control where users are able to login once and gain access…