RIP Old Internet Explorer – Impacts on Your Web Strategy
On Tuesday, January 12, 2016, Microsoft will end support for all versions of Internet Explorer (IE) prior to IE 11. Organizations [...]
On Tuesday, January 12, 2016, Microsoft will end support for all versions of Internet Explorer (IE) prior to IE 11. Organizations [...]
Making a resolution to take charge of your technology in 2014 will help you achieve your other goals.
If you haven't yet heard the term "anonymous and aggregated subscriber data," allow us to introduce you to the future.
Surprisingly, personal data inventories often reveal that your greatest point of exposure is not on your computer at all. The biggest hole in personal information security is often in your pocket.
A secure computing enterprise is important to the long-term health of your organization, and setting up a security governance structure can help ensure information security gets the attention it needs.
The truth is, we all have hard-drives worth hacking and there are always individuals willing to take advantage of weak security. One of the latest developments in online security is called Two-Step Verification, or sometimes Two-Factor Authentication.
There are many steps you, and your employees, can take to secure your data, even without the help of the IT geeks.
Council members and city staff hear a lot about information security and cyber terrorism. It is a real threat, and cities have a reason for concern. A high level road map for understanding information security can help both staff and the city council members.
Software-as-a-service firm successfully completes audit with assistance from Tripepi Smith.
Think of all the important information on your Facebook account. Now think about the data on it. Time to take two basic steps to better secure your Facebook activities and avoid reputational damage..