Blog

Facebook – Simple Steps for Safety at Home and Work- PF May 2010

In this ever-advancing age of real-time social networking, the threats to sensitive personal information keep growing. Cyber-thieves now access all the daily sites you use, just looking for that slip of info that will unlock bank accounts, passwords, and sometimes even your house!

Your Copy Machine: A Serious Security Risk?

It seems that even the most innocuous machines in the workplace can serve as a security threat to companies. According to this report from CBS News, many office copiers save the images they copy on a dedicated hard disk installed inside them. This means that everything from mundane memos to your most sensitive information such as financial statements and contracts are stored – and could potentially extracted. So the next time you dispose of a copy machine, if you’re not sure what’s stored on it and how to get it off – give us a call to help out. To see the news report, watch this video.

Thwarting Insider Threats – PF May 2010

The greatest information security threat facing your organization is in your office right now. It has the ability to bypass the physical and logical controls you’ve put in place to protect the perimeter of your network and has already obtained credentials to access a significant portion of your infrastructure. What is this threat? It’s the often underestimated insider threat — the risk that your users will violate the trust you’ve placed in them to conduct malicious activity on your network.