Entrust Identity On: Latest Posts
Businesses that aren’t properly guarded face diminished trust from their customer base.
This entry is part 2 of 2 in the series Digital Spring Cleaning Even the strongest organization-wide network security policy can leave end users exposed to threats. This security hole can lead to financial, legal, and productivity implications for the entire organization. Uneducated or unaware end users can fall prey to cyber attacks such as [Read More...]
In a move that is sure to encourage more cloud migrations, two popular and competing cloud service providers have cut prices for customers.
On Monday, Microsoft issued a security advisory (2953095) notifying IT professionals and end-consumers of a vulnerability affecting “supported versions of Microsoft Word.” Per the advisory, specific rich text files (.RTF) that can be opened or previewed using many Microsoft software products, specifically Microsoft Word (2003-2013)and related service packs, could leave users vulnerable to remote code [Read More...]
Here is an interesting theme of questions we receive all the time. Why has your CA audit report expired? Or, when will your audit report be brought up to date? The answer? The audit report is up to date and a new audit report will be provided within three months of the end of the [Read More...]
For busy travel hub Midway International Airport in Chicago, the recent implementation of automated kiosks will speed up travel time.
This entry is part 1 of 2 in the series Digital Spring Cleaning Unfortunately, end-users are often left out of the conversation when looking for ways to bolster security across the enterprise. A lack of training and education often play a big part in leaving end-users exposed to nasty forms of malware that can infiltrate [Read More...]
Developing a strategic vision for securing online relationships with customers means making security choices that will address today’s requirements and can adapt to help meet tomorrow’s challenges. To realize this vision, it is necessary to carefully assess an institution’s online transactions and the level of risk presented by each type of transaction or user group. [Read More...]
Internet Corporation for Assigned Names and Numbers (ICANN) manages domain names for websites and email servers. To date, ICANN has been controlled by the U.S Department of Commerce; however, the contract will expire in September 2015. The U.S Department of Commerce has always overseen ICANN, but generally “rubber stamps” their approach. This matches the thought [Read More...]
Central Oklahoma and North Dakota join Indiana as universities impacted by malicious attacks.