Two email encryption tools may expose info to attackers. Read on for more info.
3 key steps for website security
Part of an effective IT security program for most businesses should be protecting online transactions with customers. In this guest post, Anand Srinivasan describes some of the website security keys businesses should keep in mind.
FTC: Company kept too much data, failed to secure it
Allowing users to carry sensitive data on a portable computing device creates a certain amount of risk. But here’s a data breach that occurred because several pieces of IT equipment were stolen from an employee’s car.
IT’s guide to cloud computing security
Despite some significant cloud security concerns, many businesses are going forward with their plans to adopt cloud computing services — even when it requires uploading sensitive data to the Cloud.