cyber security month

Is Your Cybersecurity Posture Proactive or Reactive?


Two executives walk into their respective boardrooms early Monday morning. Each is greeted with news of a security incident (aka breach) that was discovered over the weekend.   The scenarios below outline the security posture of two organizations facing the … Continued

Data security compliance

Companies that outsource find they need to keep some IT work in-house


Geographic restrictions sometimes influence an organization’s use of colocation, cloud and other remote outsourcing alternatives. Regulatory compliance and jurisdictional authority are serious concerns for businesses. Not only does compliance affect data retention, security, privacy and legal discovery, but it also imposes geographic … Continued