dcsimg

Podcast: VPNs, Cybersecurity, and Data Privacy During COVID-19

Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic. … [Read more...]

6 Data Security Tips for State and Local Government Agencies

The sense of urgency around cybersecurity is reaching a whole new level for state and local governments. … [Read more...]

Podcast: IT Troubleshooting and Pivoting During the Pandemic

From data security to hardware issues, the new normal of a remote workforce has been chaos for IT teams. … [Read more...]

What is MD5?

MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today.  … [Read more...]

Podcast: How IT Can Enable a Remote Workforce

Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues. … [Read more...]

Multi-factor Authentication and Single Sign-On for Remote Employees

With entire workforces and student bodies at all levels of education now logging in from home, deploying Single Sign-On and Multi-factor Authentication is as important as ever.  … [Read more...]

What Is the Gramm-Leach-Bliley Act (GBLA)?

The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply. … [Read more...]

The Cybersecurity Risks of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers. … [Read more...]

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different. … [Read more...]

Podcast: Managing eWaste in a Secure and Compliant Manner

Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices. … [Read more...]