Author name: Megan Augustine

More than half of work from home employees admit to risky behavior

A recent report published by cyber security firm Tessian, found that 52% of employees feel they can get away with riskier behavior while working from home. The study has some revealing trends that are a true indicator of the state of security with work from home employees. For example, the study highlights that work from home employees are willing to share confidential documents via email.

More than half of work from home employees admit to risky behavior Read More »

50% Of All Work from Home Employees Are Ignoring Cybersecurity Protocols

According to a recent study, more than half of work from home employees are putting their organizations at risks for a cybersecurity attack by being lax about security protocols.  With an increase of almost a third of the country working from home due to covid-19, the amount of risk for organizations to suffer an online

50% Of All Work from Home Employees Are Ignoring Cybersecurity Protocols Read More »

90% Of Work From Home Employees Are Confident About Their Employers Security Protocols, But Should They Be?

In a June 2020 research study, IBM found that while the majority of employees said they were confident in their company’s ability to keep information secure, many haven’t been trained on work from home policies. IBM surveyed over 2,000 US based remote workers and found that out of 93% who were confident, 53% were using

90% Of Work From Home Employees Are Confident About Their Employers Security Protocols, But Should They Be? Read More »

secure your mobile phone

Tips to Secure your Mobile Phone

Our phones go everywhere with us, even to the bathroom. Let’s not talk about that. Instead, let’s focus for a few minutes on how much data lives on your personal cell phone.

Most people use their phone for much more than simply talking. If you are like me, you use it for banking, web browsing, and just about everything. Outside of work, I use my phone or tablet for 80% of my computer use.

I access social media through my phone, and even do the majority of my online shopping all through my cell phone. Fortunately, I work in IT, so I am exposed daily to the onslaught of security events. Events that are a result of defending against attackers or the threat intelligence sources we subscribe to.

Tips to Secure your Mobile Phone Read More »

Scroll to Top