Business Security Events
|Original Air Date: 10/17/12||
In a world that is increasingly dependent on IT – it is inevitable that the number of threats to IT systems and data are higher, and are growing faster than ever.
|Original Air Date: 11/15/12||
The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware and malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable targets for malware authors. Malware is part of our daily life and is platform agnostic.
|Original Air Date: 2/14/13||
IT managers must not only struggle with the increasingly sophisticated breed of malware, but they must also deal with difficult-to-manage technologies, BYOD, “point solutions,” under-resourced IT staff, and a mobile workforce. This complexity, caused by the growing demands of the business, becomes the biggest enemy to security and, as a result, organizations are finding that unwanted security gaps occur frequently.
|Original Air Date: 3/14/13||
Cyber attacks are more complex and explosive than ever before. If your organization is still attempting to tackle malicious attacks with point solutions, you are simply not doing enough.
|Original Air Date: 3/27/13||
If a modern approach to security and data protection has not been part of your virtualization strategy, there are unknown gaps that are leaving you exposed. Today’s malware imposes more business risk than ever before as hackers become more sophisticated at targeting applications, web sites, BYOD and virtual environments.
|Original Air Date: 5/8/13||
The Children’s Internet Protection Act (CIPA) requires schools to keep inappropriate and harmful online material from the eyes of students. Many schools, particularly those receiving E-rate technology funding, may feel confident that they have adequately met CIPA’s requirements.