Orange Cubes

“I would recommend MegaCryption because it does what it says, handles our current needs and future needs that will arise, has more functions than other products, and the cost of the product was great. I would rate the technical support as a 10.”
- Major Northeast University

The COVID-19 pandemic has presented a variety of challenges to everyday life. Now that restrictions are slowly being lifted and many of us are grappling with a new normal, we find ourselves asking what our new reality will look like, including the future of remote work. Ongoing social distancing measures mean many of the workforce […]

Security software can keep data safe. Strong encryption and sophisticated access controls can keep data out of the wrong hands, but for the information in the systems to be useful, employees have to be able to access and manipulate it. The legitimate access granted to employees also makes them prime targets for social engineering attacks […]

Under ideal circumstances, when employees leave your company, it is on good terms and they are just going off to pursue other opportunities. There is typically a two-week notice period where the employee and company wrap up loose ends, where the employee provides summaries on all their projects, and distributes his or her responsibilities amongst […]

Data security doesn’t happen by accident. In a large organization, it comes from the combined efforts of a number of people within the organization working together to discover and address security vulnerabilities. The title of this post is obviously a play on the late Stephen Covey’s book, The Seven Habits of Highly Effective People, and […]

DDoS attacks have been in the news and can make life difficult for companies. Here’s a little background on these Distributed Denial of Service attacks to help keep you educated and up-to-date. A number of prominent companies have been recently hit by increasingly powerful DDoS attacks. DDoS (or distributed denial-of service) attacks attempt to make […]

Properly encrypting and storing backups is essential for recovery from a system failure or massive data loss. While they have some similarities, data backup and disaster recovery planning require different tools and processes. The primary purpose of data backup is to make it possible to restore your information to use should the original copies become […]

Users and employees are human, it turns out — and forget or lose their passwords from time to time, making password resets an important part of any digital security system. But rather than taking up a significant amount of Help Desk employee time and operating with the risk of inadvertently giving out a new password […]

Single sign-in (SSO) has some benefits — and some attendant risks. Here are a couple of easy steps to making your company’s SSO system more secure. Single sign-on (SSO) is a method of access control where users are able to login once and gain access to all systems they have authorization to use without any […]

Human targets are often the easiest way for hackers to gain unauthorized access to data. Here are a few ways you can help stop these social engineering attacks before they can even get started. In the context of data security, social engineering involves psychological manipulation hackers use to get people to give up confidential information […]

Enterprise systems can include mainframes and many other interconnected systems such as peripheral hardware, hundreds or thousands of virtual machines, native applications, Help Desks, BYOD users, and Cloud servers and storage. Here are some things to watch for while designing or reviewing your security system and policies. Mainframes must be able to maintain high availability […]