Increase security by limiting permissions to the essentials
Published on September 9, 2014
Selecting what data sets each user or group of users has access to greatly impacts your data security. Selecting appropriate user permissions is a necessary balancing act between security and utility. You must find the appropriate balance between limiting the risk of data being lost,…
The Three States of Digital Data
Published on September 3, 2014
Understanding the different states digital data can be in can help you select the kinds of security measures and encryption that are appropriate for protecting it. There are three basic states of data: data at rest, data in motion, and data in use. Below you…
File (over)sharing
Published on August 19, 2014
File sync services like Dropbox, Box, and Skydrive make it very easy to store an individual's data across multiple devices and share it with friends and colleagues. These freely available file syncing and sharing services are incredibly convenient, but also make it possible to inadvertently…
Protect Sensitive Data from Angry Ex-Employees
Published on August 14, 2014
Under ideal circumstances, when employees leave your company, it is on good terms and they are just going off to pursue other opportunities. There is typically a two-week notice period where the employee and company wrap up loose ends, where the employee provides summaries on…
Where to Spend Your Next Security Dollar
Published on July 24, 2014
Deciding how to spend limited data security budgets requires you to think critically about where the biggest potential threats to your system and data will come from and what the most effective ways to eliminate those threats are. Once the basic security protocols are in…