Security

MalwareBytesSecurity

4 Steps for improving employee trust while securing them

Credit to Author: Dana Torgersen| Date: Wed, 23 Aug 2017 19:04:56 +0000

4 key steps you can take within your business to help gain trust with your employees while educating them to make more secure decisions.

Categories:

Tags:

(Read more…)

The post 4 Steps for improving employee trust while securing them appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

The paranoid Windows traveler’s data-protection checklist

Credit to Author: Richard Hoffman| Date: Wed, 23 Aug 2017 03:11:00 -0700

It used to be that the most intrusive experience business travelers faced at airport security was a possible pat-down, or a customs check of luggage. These days, border control agents are searching passengers’ phones, tablets and laptops for … well, anything they want to see. Your complying with the request grants them access to documents, emails, passwords, contacts and social media account information. So travelers carrying confidential or privileged corporate information (in addition to the merely personal) need to take steps ahead of time to ensure that private data stays private. 

The laws around data privacy at checkpoints are murky, and border control officers in the U.S. and elsewhere have been making full use of the allowable gray areas, asking travelers to turn over email logins and social media passwords, searching devices and making forensic copies of data. If this concerns you and your company, these tips could prove useful. While legal issues vary by country, most of these suggestions will provide a measure of data security in a variety of situations.

To read this article in full or to leave a comment, please click here

Read More