Monthly Archives :

August 2014

The Benefits Full Disk Encryption

Why use disk encryption to encrypt laptops and desktops? Well, why not? There is much talk about security in the cloud and protecting data in transit. But what about data at rest? What would happen if your laptop was lost or stolen? Consider the information we keep on our hard drives: passwords, cached cloud storage,…

read more

Centralized IT Security Management through a “Single Pane of Glass”

For years I have heard the term, “single pane of glass” repeated by software vendors time and time again, and many times I thought the term overused to a point that it became just another marketing term to throw around.  Recently though I was at a client meeting with a well- known security vendor where…

read more

Multi Factor Authentication

Multi Factor Authentication is here and has been a part of our everyday life for a few years now. Everyday examples include: Your ATM Card + Pin to withdraw money from the ATM machine; if you have a safe deposit box, you’ll need two keys to open it; some web pages ask you to enter…

read more

AB 1149 Aurora Releases “Compliance Data Security” White Paper

Aurora has just released a new white paper documenting the Best Practices for Data Security in regard to AB 1149 Compliance. AB 1149 is a new bill which requires notification of data breaches for local and county government agencies. With the goal of Identity Theft prevention, AB 1149 mandates that local and country government agencies…

read more

AB 1149 Demands IT Security Compliance for Local and County Government

Data Security strategy has often been the result of government mandated compliance requirements. With regulations governing the use of payment cards ( PCI ) to healthcare industry information ( HIPAA ), services such as hosted laptop encryption, data loss prevention, endpoint security, firewalls and other data security offerings have acted as “insurers” to safety and…

read more