fbpx

White Papers

Are we at DEFCON 1 for Data Breaches? 

How government agencies can ensure that their valuable data doesn’t fall into the wrong hands  Cybercrime continues to be on a steady incline.  No matter what type of industry or organization you work in, it knows no boundaries.  In this paper, however, we take a closer look at the  government sector.  The organizations and agencies… Read More

The gig economy has put corporate data at risk

Compounding the complexity of remote working, a recent rise in the gig economy is spreading enterprise data security issues even wider, as workers are brought in on a brief timeframe to fill specific roles and tasks.  Unfortunately, this fleeting arrangement further increases the attack surface whereby hackers can breach the network, spreading workers outside the… Read More

Beginners Guide to Encryption for Compliance and Data Protection

Download our free guide here (PDF) Encryption protects data from eager cyber criminals. No matter the vertical, platform or application, whether a tablet, website, a legacy workstation, or a medical device, personal data is always at risk. Whether our most vital data is “at-rest” – on our computers or devices – or “in-transit” – wherever… Read More

You’re collecting data on your website, but is it secure?

No matter what website builder you may be using, there are always security concerns to ensure that both yours and your users’ sensitive data aren’t compromised when a breach occurs. This is especially true on sites with a higher degree of user interactivity.  If people are sharing their personal details on a website, the risk… Read More

Microsoft Surface delivers on power and speed, but is the data on your device secure?

The rapidly growing remote workforce is dramatically changing how we live and work to meet the new hybrid collaborative economy.  According to TechRadar, 82% of managers say that even post-COVID they will have more flexible remote working policies.  This demands more flexibility and mobility with the tools we use to get the job done –… Read More

Need to encrypt your SQL Express data? NetLib Security has a fast, easy answer that won’t break the bank

SQL Express for years has been a cost effective solution for your small database requirements, but now more than ever these databases are coming under scrutiny for not being privacy compliant.  To proactively and transparently secure sensitive data on this platform, and assist with compliance standards, NetLib Security’s data encryption solution for SQL Express protects… Read More

Legacy Workstations Security – What to do when you’re no longer supported

Operating on an old laptop? Have a bunch of old desktops in the office? In light of Microsoft ceasing support of Windows 7 last January, new security concerns revolve around protecting outdated desktops and laptops.  This is pertinent whether people are still working remotely, if they’ve already begun returning to the office, or a combination… Read More

Beginners Guide to Encryption and Key Management (and Encryptionizer)

Download full White Paper (PDF) To Encrypt or Not Encrypt Encryption protects our data. It keeps it secure whether it’s “at-rest” – such as sitting on our computers or devices – or “in-transit” – wherever we are transmitting conversations from point A to point B over the Internet. Encryption renders the data useless if it… Read More

Medical Device Encryption & Security

Managing the Internet of Healthcare Electronic Medical Devices (EMD) ­are the computerized instruments and apparatuses that come into direct contact with patients are and used to diagnose and/or treat.  The proliferation of these devices across the entire healthcare industry has provided extra convenience for both organizations and patients alike.  New applications have facilitated the collection,… Read More

Application Encryption and Security

As organizations continue to integrate more applications into their environment, application security becomes a growing concern. Gartner uses a helpful metaphor for thinking about applications security: Applications are like a pirate’s treasure chest, and sensitive data is the cache inside. So, how are cybercriminals raiding your cache & what can your organization do to ensure… Read More

Top