IT security best practices

Security Anarchy in the UK

Security Anarchy in the UK

Cyber security programs have, for the most part, been wall building exercises. IT security leaders and practitioners have posited that if we prevent the punks and professional bad guys from breaching the walls, then the rest is less important. That may have been the case a decade ago, but the era of mobile, cloud, constant access, and apps everywhere has turned the walls into sieves…

Cyber Security Best Practices, a Q & A

Cyber Security Best Practices: a Q &A

We sat down with Jonathan Sander, VP of Product Strategy at Lieberman Software, to discuss cyber security best practices that organizations can leverage to protect themselves from cyber attacks, and what we can expect to see in the cyber security industry moving forward.

7 Tips to Keep Former IT Employees Out of Your Network

Simply because an IT employee leaves your organization doesn’t mean you’ve seen the last of him. As the famous Shionogi incident showed us, ex-employees – including contractors – can wreak significant havoc on their former employers’ networks using the same privileged logins they had while employed.