Data Breach/ID Theft

How Secure are Smart Devices?

As the holiday season approaches, it’s likely that many of us will be receiving smart devices as gifts. Smart devices are becoming more and more common, and many of our appliances even have “smart features”. In fact, you may be in possession of some of these items, and not...

Wifi Security & Public Networks

It’s no secret that wifi has changed the way many companies are able to do business, but wifi security is something that should be more of a focus. Wifi is by no means a new technology. However, the pandemic has had many corporations reevaluating the secure nature of public...

Different Types of Security In Records Management

Security threats in records management come from all directions ranging from malware and data breaches to theft, fire, or flood, making it essential to incorporate multiple types of security in records management. In this video you’ll learn more about why using multiple security strategies is important, where top security...

The Data Breach Case Study & Protection Guide

Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious...

Password Hacks: How to Create a Strong Password

Passwords have been our primary source of security since the beginning of the digital age, and their origins can be traced back to ancient times. As technology progresses, hackers with malicious intent find new ways to crack passwords and steal information. As society delves deeper into the digital world...