An Introduction to Virtual Private Networks – Part 6

Introduction Our last blog post of the series focused upon the issues faced by the deployment of a Virtual Private Network (VPN) from the standpoint...

The Need for An Incident Response Plan – Part 4

The Importance of Communications in Incident Response Just as much as it is important to have a clearly defined Incident Response Plan and having the...

Data Loss Prevention – Part 2

Introduction Our last blog post of this series examined what Data Loss Prevention is, and the three major types of data categories of DLP Systems...

The Need for An Incident Response Plan – Part 3

Introduction Our last blog post of the series examined the benefits versus the risks of going offline in case your business was hit by a...

How Biometrics Can Be Used for Logical Access Entry – Part...

Biometrics is another security technology that is used to 100% confirm the identity of an individual in question. The tools that are utilized can do...