5 Ways to Improve Insider Threat Prevention
Richard Henderson
5 Ways to Improve Insider Threat Prevention

If you browsed the latest security headlines, you’d probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity. While we recently examined the rising of the politically motivated insider, the truth is that most incidents are traced back to employees...

READ MORE
5 Steps to Securing Your School’s Mobile Devices Over the Holidays
Harold Reaves
5 Steps to Securing Your School’s Mobile Devices Over the Holidays

Much to the delight of students, faculty and administrators everywhere, holiday break is almost here! But they aren’t the only ones eagerly anticipating end of semester school closings: criminals are also waiting for campus shut downs so they can help themselves to the valuable technology now commonplace in most schools, from K-12 to colleges and universities. Before taking off for the winter break, follow these easy steps to ensure...

READ MORE
Absolute Strengthens Endpoint Security Posture at Asplundh
Kim Ellery
Absolute Strengthens Endpoint Security Posture at Asplundh

Founded in 1928, Asplundh is a full-service utility contractor performing vegetation management services for specialized markets such as municipalities, railroads, pipelines and departments of transportation. With over 30,000 service professionals throughout the US, Canada, Australia and New Zealand, the complexity and number of endpoints have grown significantly in the past 10 years. With 95% of their workforce mobile, Asplundh struggled to manage and secure the devices in their deployment....

READ MORE