Blog

Endpoint Security Layer Case Study

All of your organization’s security controls help reduce the chance for breach, but the rubber meets the road almost exclusively on 2 pieces of your organization’s protection: Endpoint Security and Email Security. Around 90% of the breaches I see are ultimately because of compromised email or compromised endpoints. Obviously, this is not based on studies,

Read More

Data Encryption, Stop Hiding from it!

Security. Depending on your upbringing, and the capability of security professionals you have encountered, this word may cause you to raise your head a little higher and hear superhero music playing in the background. Yep, that’s how I am. Or security may just be another 4-letter word (times 2). Security commonly references the CIA triad: Confidentiality (only

Read More