Cybersecurity

6 Cybersecurity Tips for International Business Travelers

Posted: 09/20/2021 - 09:00
6 Cybersecurity Tips for International Business Travelers

Without a doubt, international business travelers face a high risk of cybersecurity breaches. If you travel for work, you’ll likely have to do business on more than one device, including laptops and smartphones. If your trip is for pleasure, you might use a phone or tablet to share special moments and keep in touch with folks back home. The information on your computer or mobile device is sensitive, and you don't want it to fall into the hands of the wrong person.

Three Supplier Conversations You Need to Have Now

Posted: 08/30/2021 - 09:00
Your suppliers’ threat profiles will inevitably add to your business’ cybersecurity risk.

Suppliers are mission-critical partners for business success. Unfortunately, too often, an “arm’s length” relationship creates problems that are revealed only after it’s too late.

When suppliers feel conversations only occur after poor performances, the opportunity to have a productive, collaborative conversation may already be over.

4 Tips to Improve Supply Chain Resilience

Posted: 07/12/2021 - 09:00
4 Tips to Improve Supply Chain Resilience

The year that started the global pandemic also brought more than just the coronavirus. The world became acutely aware of the weak links within the global supply chain. At the onset, product and people movements were challenging. We saw supply shortages not entirely driven by hoarding behavior, but because the supply chain was stuck.

The question became this: How do we get people and products moving safely, without jeopardizing employees’ health, safety and well-being, as well as customers?

Responsible InfoSec is the Hot New Purpose

Posted: 05/05/2021 - 09:00
Responsible InfoSec is the Hot New Purpose

Digital transformation is the phrase on everyones lips – for good reason. It enables organizations to better manage operations, enhance profit margins, and ensure the efficient transfer of goods and information between supply chain nodes. As a procurement professional, youre on the front line of this process. This is also why you need to be the first line of defense.

Detecting the SolarWinds Hack

Posted: 02/25/2021 - 09:00
Prominent cybersecurity firms such as Microsoft and FireEye were victims of the SolarWinds attack and also the first to identify it.

Detecting the SolarWinds Hack

The cybersecurity world has been overtaken with concern over a state-sponsored cyberattack perpetrated by Russian intelligence agents against multiple federal agencies, including those responsible for our nuclear stockpile. Prominent cybersecurity firms such as Microsoft and FireEye, who were also victims of the attack, were the first to identify it. 

There’s Plenty of Room at the Table for Nearshore and H-1B Visa Holders

Posted: 10/12/2020 - 09:45
Nearshoring, however, provides the innovation, skillset and diversity to keep tech innovation moving forward with or without visa restrictions.

In June 2020, in response to the coronavirus, President Trump signed an executive order to freeze access to new H-1B visas for professional and technology workers doing business in the U.S. This has a huge impact, considering in 2019 about 139,000 new H-1B petitions were approved, joining 250,00 which were extended.

What Is ISO 27001? Everything You Need to Know

Posted: 09/25/2020 - 20:52
The ISO 27001 standard is meant to prevent cyber threats from becoming security incidents.

Data security is a significant issue of concern for both small and large organizations. As an organization holds onto data collected from customers and vendors, it should be wary of the threat posed by cybercriminals. There are several standards that you should comply with when it comes to information security. ISO 27001 is one such standard.

How Quantum Computers Will Change Our World

Posted: 06/12/2020 - 22:14
Quantum Computers

There’s something that has been revolutionizing our world without us even noticing it. A technological device that promises to create a new way to encrypt information and process data. This technology is called quantum computing. This isn’t something easy to understand at first, but once we know the science behind it, we’ll be able to see the benefits this could bring to our society. 

Securing Remote Workforces, Payments and Customer Data in a Rapidly Evolving World

Posted: 06/12/2020 - 00:01
Securing Remote Workforces for compliance

While the rapid shift to a remote workforce model in the wake of the COVID-19 pandemic has driven many changes for businesses around the world, a few constants have grown in importance. To maintain operations as seamlessly as possible, organizations must secure their payment systems, technology access, and sensitive customer data no matter where it resides, and that is particularly true when it is being accessed or processed by employees from their homes.

Pages

Subscribe to RSS - Cybersecurity