DDoS Attacks: A Brief Primer
Published on July 2, 2014
DDoS attacks have been in the news and can make life difficult for companies. Here's a little background on these Distributed Denial of Service attacks to help keep you educated and up-to-date. A number of prominent companies have been recently hit by increasingly powerful DDoS…
Data backup and Disaster Recovery
Published on June 19, 2014
Properly encrypting and storing backups is essential for recovery from a system failure or massive data loss. While they have some similarities, data backup and disaster recovery planning require different tools and processes. The primary purpose of data backup is to make it possible to…
Password Reset Security — It Takes Two
Published on June 11, 2014
Users and employees are human, it turns out -- and forget or lose their passwords from time to time, making password resets an important part of any digital security system. But rather than taking up a significant amount of Help Desk employee time and operating…
Risks of Single Sign-on Password Systems
Published on June 3, 2014
Single sign-in (SSO) has some benefits -- and some attendant risks. Here are a couple of easy steps to making your company's SSO system more secure. Single sign-on (SSO) is a method of access control where users are able to login once and gain access…
ASPG Strengthens International Reach with Additional Distributors
Published on May 29, 2014
Naples, FL – May 2014 – Advanced Software Products Group, Inc. is pleased to announce the addition of three new international distributors – Keylink Technologies, L J A Soluciones, and PDBA. As part of our worldwide network of partners, they will be providing over 20…
Understanding and Defending Against Social Engineering Attacks
Published on May 27, 2014
Human targets are often the easiest way for hackers to gain unauthorized access to data. Here are a few ways you can help stop these social engineering attacks before they can even get started. In the context of data security, social engineering involves psychological manipulation…
Closing the Gaps in Your Data Security
Published on May 20, 2014
Enterprise systems can include mainframes and many other interconnected systems such as peripheral hardware, hundreds or thousands of virtual machines, native applications, Help Desks, BYOD users, and Cloud servers and storage. Here are some things to watch for while designing or reviewing your security system…
The Common Sense Backup Strategy
Published on May 13, 2014
It's not all hackers and thieves out there -- human errors, natural disasters, and hardware failure are all potential sources of data loss. Here are some things to think about when planning your company's data backup strategy. Data security is an issue that all organizations…
What to Do Before Encrypting Your Data
Published on May 5, 2014
Encryption is worth doing the right way. Here are some things to think about for your company's encryption strategy. It's common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful…
7 Signs You Should Invest In Data Security
Published on April 30, 2014
Businesses run on data, and customers trust them or abandon them based on how well they take care of that data -- but many organizations are ill prepared to prevent or deal with a data breach. Robert Westervelt wrote for CRN that one of the…