by Katherine Parker | Aug 16, 2018 | Data Security, Email Environment Security, Uncategorized
Once upon a time, not all that long ago, if you heard the word “spoof” you might have thought about a Mel Brooks movie, or a Carol Burnett skit, or any number of comedic acts presenting a humorous imitation of another act. The thought of “spoofing” someone was to give...
by Katherine Parker | Aug 14, 2018 | Cloud Computing
The versatility that comes with cloud computing and hosting – for small firms, enterprise-level corporations, and everything else in between those two extremes – is generally accepted, and vaguely understood by the typical man on the street. It is common knowledge...
by Katherine Parker | Aug 10, 2018 | White Papers on Law Firm Data Security
Law firms care about cybersecurity breaches because they are a real and growing threat. By Nicolle L. Schippers...
by Katherine Parker | Aug 6, 2018 | Data Security
No matter what industry your company represents, there are certain constants, and one of them is loss prevention. Loss prevention is everything: money coming in to a company must not be squandered by costs that are counterproductive to profitability. Legal costs that...
Recent Comments