Archive for the "Security" Category

Sort by:

Global Increase in Outsourcing Leaves Companies Open to Information Security Breaches

January 23, 2012, Albuquerque, NM- Global economic troubles have motivated many companies to seek alternative means of conducting business that will cut costs and maximize profits. One of the most popular and effective methods is outsourcing Information Security (IS) infrastructure. According to a recent study commissioned by Savvis, Inc. this number is predicted to increase […]

Making the Most of Online Transaction Security

Options today for online transaction security are plentiful.  However there are some choices that will work better for you than others.  Of course there are the simple processes which require entry of a user name and password which is set up in the system already.  These are somewhat secure, but not completely. The use of […]

Securing Your System Using A Telephone Identification Number

Many different problems can be presented for securing the system that you use for your corporate data today.  When you are searching for a better way to ensure online security, you will discover that many new methods are available.  Today however it is important that a two step process be used to be certain that […]

Using Dual Factor Authentication Today

Hackers today will find many ways to breach any security system that you put in place for protecting your data today.  Each time a new system is implemented, the hackers find a new way to break it and gain access to the information.  As a result, corporations are searching for ways to protect their information […]

Using Out-of-Band Authentication for Added Security

Choices for protecting your information today are varied. You can use a user name and password to protect your data, but this method has been proven very ineffective at blocking attacks from very skilled hackers.  It isn’t difficult to determine a user name as this information is not usually hidden.  It also it very easy […]