Information Technology Professionals - IT Pros USA


Category: IT Security

What are the Eight Rights of Users Granted by GDPR Laws

Before you start reading, check out our free GDPR Webinar! If you missed our introduction to GDPR, you can catch up now or read it after learning about the eight rights of the user. At its core, GDPR seeks to provide consumers with better personal data security. This extends much farther than most people initially thought. Individuals […]

Read More »

GDPR Compliance – Coming to an International Business Near You

Before you start reading, check out our free GDPR Webinar! Has your inbox been flooded with emails from online retailers, service providers and all those newsletters you’ve subscribed to? Organizations all over the world are preparing for new personal privacy laws that went into effect last Friday. As a note, this is a European law, not […]

Read More »

Not your Father’s Phishing

As we approach Tax Day, it’s a great time to talk about personal information security, and specifically, how to avoid phishing scams. Scams Increase during Tax Season For those who don’t know, phishing is a form of fraud where the scammer attempts to gain access to your personal information by posing as a reputable source […]

Read More »

10 Steps for Effective Vulnerability Management

Data Security: Effective Prioritization & Management For every organization, information is a valuable asset, yet it is challenging to secure. As the value of information increases so too does its attractiveness to criminals and other attackers. However, unlike other valuable assets such as cash, information is not secured in a large safe which can be easily […]

Read More »

5 Technology Decisions to Make Now

One of the most crippling things a business can do is neglect to make decisions. Often businesses and departments wait too long and their hands are forced to make decision without thoughtful consideration or alignment to a long-term strategy. Strangely, this is what most SMBs choose to do when it comes to their technology decisions. The problem […]

Read More »

2 Reasons Apple Users Should be More Security Aware Immediately

I am an Apple and Windows user.  No way around it in my line of business I have to live on multiple platforms every day.  Spent a fair amount of time over the last 2 weeks using my old friend CentOS (Linux) even.  Often times people feel the warm flow of their Apple logo protects […]

Read More »

Apple vs FBI in 3 Bullet Points What You Should Know

There has been a lot of press lately about an ongoing argument between our government and one of the world’s largest technology companies, Apple.  I wanted to take a moment to distill this debate down and explain what some of the core issues are. Solid State Drive and Program encryption.  If you have a desktop […]

Read More »

Is Windows 10 Stealing All of Your Passwords and Personal Information?

As you know, Microsoft has released a new product – which means it’s also time for the internet world to bombard everyone with their opinions and judgments of the newest, hottest operating system Windows 10. One reaction which I appreciate is about security and privacy.  I spend my share of time alerting people to privacy […]

Read More »

Fighting the Toughest Battle in Cybercrime: Spear phishing

Introduction:  Just a couple weeks ago, CBS ran a 60 Minutes segment about the cyber-attack on Sony Pictures, and it brought to light the dangers of phishing. Specifically, it highlighted a tactic called Social Engineering, which is a technique used by cybercriminals to manipulate people through trickery to get them to divulge information.  Social engineering […]

Read More »

How Your Phone System May Be Stifling Remote Employee Productivity

Imagine for a moment that you’re a sales manager at a growing company and you’ve just been tasked with building a remote team of 40 sales reps. Your company’s headquarters is in Boston, but these reps will primarily work out of their home offices and much of their time will be spent on the phone […]

Read More »

Next Page »


Get Started