business continuity

Attack of the Drones - Is Your Business Ready?

Call them whatever you prefer—"unmanned aircraft systems" (UAS), "small unmanned aircraft systems" (sUAS), "unmanned aircraft vehicles" (UAV), or simply "drones"—these devices have evolved rapidly over the last few years to the point where they count as a significant force in the innovation of industries ranging from photography and film making, through farming and surveying, to maintenance and power line inspection. "So," you might be thinking "that's all very cool but what's that got to do with my company and security?"

Grant Access to Workflows, Not to Systems or Data

It happens all the time: Employees, departments or even third-party entities request access to business applications so they can perform important tasks. How much access should they be granted - and to which systems and data. Expert Mike Fitzmaurice sheds some light on enterprise application workflow best practices.

How Law Firms Can Guard Critical Information from Cyber Attacks

Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.