Password Management for Businesses

Every organization has the same problem, you have dozens, if not hundreds of websites that require (and we demand) secure credentials to access their services. Some websites, such as the IRS complicate matters by requiring an id, PIN and other identifier. So you need...

TLS Encryption

It is important for organizations that require a greater level of security for inbound and outbound email traffic to understand the benefits of using Transport Layer Security (TLS) protocol. What is TLS Encryption? Transport Layer Security (TLS) and its predecessor,...

Lessons From Equifax

Equifax, a major US credit bureau, has experienced a massive data breach. While analysis of the exact causes and the fallout from this breach are still under scrutiny, there are some suppositions and guesses that are, if not definitive on the Equifax side, at least...

Boarding Passes and Information Security

Recently, Brian Krebs posted a story about the information shown on airline boarding passes. It’s interesting to see exactly how much secret/secure information is printed on a disposable piece of paperwork; much of it is secured only by format; barcodes are difficult...

Leaks and Security Practices

With large security breaches becoming a more consistent phenomenon, many companies are looking for ways to keep from being the next victim. One of the most intense concerns has been unethical employees – a person in a position of trust can do a lot of damage. The...