fbpx

White Papers

Are we at DEFCON 1 for Data Breaches? 

How government agencies can ensure that their valuable data doesn’t fall into the wrong hands  Cybercrime continues to be on a steady incline.  No matter what type of industry or organization you work in, it knows no boundaries.  In this paper, however, we take a closer look at the  government sector.  The organizations and agencies… Read More

The gig economy has put corporate data at risk

Compounding the complexity of remote working, a recent rise in the gig economy is spreading enterprise data security issues even wider, as workers are brought in on a brief timeframe to fill specific roles and tasks.  Unfortunately, this fleeting arrangement further increases the attack surface whereby hackers can breach the network, spreading workers outside the… Read More

You’re collecting data on your website, but is it secure?

No matter what website builder you may be using, there are always security concerns to ensure that both yours and your users’ sensitive data aren’t compromised when a breach occurs. This is especially true on sites with a higher degree of user interactivity.  If people are sharing their personal details on a website, the risk… Read More

Microsoft Surface delivers on power and speed, but is the data on your device secure?

The rapidly growing remote workforce is dramatically changing how we live and work to meet the new hybrid collaborative economy.  According to TechRadar, 82% of managers say that even post-COVID they will have more flexible remote working policies.  This demands more flexibility and mobility with the tools we use to get the job done –… Read More

Encrypt your SQL Express data, it’s easy!

The threat to your SQL Express Data: For years, SQL Express has been a cost effective solution for your small database requirements, but now more than ever these databases are coming under scrutiny for not being privacy compliant.   With remote work currently a reality for many organizations for the foreseeable future, a surge in usage… Read More

Legacy Workstations Security – What to do when you’re no longer supported

Operating on an old laptop? Have a bunch of old desktops in the office? In light of Microsoft ceasing support of Windows 7 last January, new security concerns revolve around protecting outdated desktops and laptops.  This is pertinent whether people are still working remotely, if they’ve already begun returning to the office, or a combination… Read More

Medical Device Encryption & Security

Managing the Internet of Healthcare Electronic Medical Devices (EMD) ­are the computerized instruments and apparatuses that come into direct contact with patients are and used to diagnose and/or treat.  The proliferation of these devices across the entire healthcare industry has provided extra convenience for both organizations and patients alike.  New applications have facilitated the collection,… Read More

Application Encryption and Security

As organizations continue to integrate more applications into their environment, application security becomes a growing concern. Gartner uses a helpful metaphor for thinking about applications security: Applications are like a pirate’s treasure chest, and sensitive data is the cache inside. So, how are cybercriminals raiding your cache & what can your organization do to ensure… Read More

Transparent Data Encryption (TDE) – Encryptionizer vs. SQL Server

NetLib® Encryptionizer® TDE offers some important advantages over MS SQL Server’s Transparent Data Encryption (TDE)

SQL Encryption: Difference Between NetLib Security’s Whole Database and Column Level Encryption Methodology

NetLib® Encryptionizer® is the only product line that can provide both whole database and column-level encryption for all Editions and versions of SQL Server. Below is a discussion of each of the methods by which data in SQL Server can be protected. NetLib Encryptionizer Whole Database Encryption and Column Encryption products can be layered to… Read More

Top