Employees are one of your biggest security holes. There is no foolproof prevention method for human error, and this is why employee mistakes are one of the most common causes of a security breach. So what can you do to prevent it? Well at the very least you need to include policies in your employee handbook, and ensure your employee reads through it and signs off on agreeing to abide by them. Having measures in place drastically reduces the chances of a security breach. Here are four areas to keep in mind when developing your own.
Digital West Blog
Although Digital West is privileged to support many San Luis Obispo area non-profit organizations with in-kind hosting and other charitable contributions, September has been a month to focus on the company Core Value of Giving Generously.
At Digital West, Giving Generously is a value that allows us to help our community thrive and succeed. We have grown and continue to grow because of the support of the community in all areas - commerce, education, non-profit and government.
Topics: Digital West Community Support
The Society for Information Management (SIM) published a report not too long ago defining the Top 10 concerns that CIOs have in 2016. Not surprisingly, “security and privacy” and “cost reduction” were on the list, but what is notable is the growing understanding that technology and business must work hand-in-hand. A company’s IT investments are key factor in its ability to innovate, to create efficiencies, to create alignment. This quote from the report summarizes it well:
Meet our wonderful VP of Marketing, Meg McCall! Meg has extensive experience in marketing, information technology and community relations. For 15 years after college, she worked in various roles at United Way in Madison, Wisconsin, and then went to work for her alma mater, UW-Madison, as the Senior Marketing Manager for the Division of Information Technology (DoIT). Upon moving to San Luis Obispo in 2009, she became the Director of Marketing at MINDBODY, a SaaS business management software provider.
Meg has been a vital member of the Digital West team, serving in a marketing consulting capacity since June of 2013, but she just recently accepted a full-time position with us as VP of Marketing. Ironically, after spending most of her life in the Midwest, Meg has been splitting her time between San Luis Obispo and Ithaca, New York the last few years. Now she’s back in SLO, and we are thrilled to have her here.
According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves -- social engineering. Unlike malware and other viruses, social engineering tricks people into divulging sensitive data to hackers. Unfortunately, businesses are also vulnerable to various social engineering tactics. As a business owner, you should be vigilant of these common scams used by hackers.
Digital West's Core Value of Giving Generously drives us to provide in-kind website hosting to any local non-profit, and Jack's Helping Hand is one of the many incredible organizations in our community that we support. We value the work that Jack's Helping Hand does of improving the lives of children in the community and want to let our followers and fans know about them.
Topics: Digital West Community Support
Talkin’ Cloud recently posted a blog featuring research from BetterCloud and 451 Research suggesting cloud applications make IT teams better at work. Excerpts from the blog follow.
Kaspersky Lab and Symantec, two leading security providers, have discovered a sophisticated form of malware that went undetected for five years. It’s called Project Sauron, a reference to JRR Tolkien’s dark lord.
TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware. This means the time for security professionals to boost cyber situational awareness has never been more fitting. These are the seven latest threats that have recently surfaced:
In October 2015, the European Court of Justice declared the previously valid Safe Harbor agreement for transatlantic data transfer to be invalid. On February 2, 2016, it became clear that the two negotiating parties would work on a follow-up agreement. In the meantime, legal uncertainty prevails. Not only can data protection authorities submit further claims, the new Privacy Shield agreement still has to be passed by the EU states and the EU parliament.
Topics: Data Center