security audits


You've invested in firewalls and your servers are patched. Clients are running updated anti-malware software and spam and phishing filters are turned up to 11 on your mail servers. Flash? Not running it. Role-based security measures? Implemented three years ago...of course. And BYOD? Only with approved AV and signed acceptable use and access policies. Your IT staff actually sleeps at night because you don't just have a security plan - You actually follow it. Unfortunately, the reality for most organizations is a bit different. Smaller... [Read More]
by RSS Chris Dawson  |  Aug 26, 2015  |  Filed in: Industry Trends & News