Posts by Kim Ellery

Kim Ellery
Kim Ellery serves as a Senior Director of Product Marketing at Absolute. In this role, Kim drives the development and direction of Absolute’s go-to-market strategy, including facilitating product and market intelligence while engaging with Absolute staff, customers and partners. Prior to Absolute, Kim served in product management and marketing roles at Mobile Mentor within Asia-Pacific and Europe, where he developed and implemented effective mobile security solutions. Kim is also involved with a number of entrepreneurial ventures in the local tech community, and a mentor to aspiring product marketers at Product BC.
Cybersecurity Threats Part 2: Cybersecurity Checklist
Kim Ellery
Cybersecurity Threats Part 2: Cybersecurity Checklist

In our second part of a two part series on cyber threats, we look at how opportunistic cyber criminals are and ways you can protect your organization (and your data). It’s pretty clear that cyber criminals are employing a wide variety of tactics to breach your organization for financial gain. Their efforts result in significant costs for those on the receiving end. The Center for Strategic and International Studies,...

READ MORE
Cybersecurity Threats Part 1: How a Hacker Hacks
Kim Ellery
Cybersecurity Threats Part 1: How a Hacker Hacks

Cybersecurity is far from clear cut. There are many different approaches to protecting data and seemingly countless technology tools. Truth be told, a little luck helps sometimes too. One tried and true strategy is to learn from the organizations who have already fallen victim to hackers and their antics. Unfortunately, opportunities for lessons learned are many. In the last couple of years, a few mega breaches stand out. In...

READ MORE
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control
Kim Ellery
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control

Solid-state drives (SSD) have long been great tools because they automatically encrypt data stored on them and when the device is disconnected from its host device, the data on the SSD becomes unreadable. Additionally, hardware-based encryption uses fewer systems resources than software-based encryption so they were a perfect solution for data storage, or so we thought. Earlier this month, it was reported that researchers from Netherlands’ Radboud University published...

READ MORE
Managing and Securing Data for the Remote Workforce
Kim Ellery
Managing and Securing Data for the Remote Workforce

The number of remote workers continues to climb in the U.S., according to Gallup’s State of the American Workplace Report. While a remote workforce may bring down overhead costs and even provide a boost in productivity, they also increase the chance your organization will experience a data breach. According to a 2018 study by Shred-It, 86 percent of CXOs attribute heightened breach likelihood to employees working outside of the...

READ MORE
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance
Kim Ellery
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance

According to a recent survey, most people (71 percent) want their state and local governments to spend more money on preventative cybersecurity measures and even more people (74 percent) think officials should take steps to better secure constituents’ personal data. Constituent demand isn’t the only demand driver however. Compliance demands also illustrate state and local governments have their work cut out for them when it comes to bolstering security....

READ MORE