Results for third-party

Industry Trends

If You're Not Being Audited and Pen Tested, You Should Be

You've invested in firewalls and your servers are patched. Clients are running updated anti-malware software and spam and phishing filters are turned up to 11 on your mail servers. Flash? Not running it. Role-based security measures? Implemented three years ago...of course. And BYOD? Only with approved AV and signed acceptable use and access policies. Your IT staff actually sleeps at night because you don't just have a security plan - You actually follow it. Unfortunately, the reality for most organizations is a bit different. Smaller...

By Chris DawsonAugust 26, 2015