Cimcor Blog

How to Detect and Stop a POS Breach Before it Happens
How to Detect and Stop a POS Breach Before it Happens
While the holiday shopping season may be over, there's a strong chance that another wave of point-of-sale (POS) system attacks against retailers,...
The 7 Scariest BYOD Security Risks (and How to Mitigate Them!)
The 7 Scariest BYOD Security Risks (and How to Mitigate Them!)
Bring-your-own-device (BYOD) programs experienced significant popularity in 2016. LinkedIn's Information Security Group, and Crowd Research Partner's...
The 6 Most Common Network Vulnerabilities Haunting CSOs in 2017
The 6 Most Common Network Vulnerabilities Haunting CSOs in 2017
Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage,...
5 Network Security Best Practices You Need to Implement in 2017
5 Network Security Best Practices You Need to Implement in 2017
The network security landscape is always changing. New threats are constantly appearing on the horizon. Cybercriminals are becoming more effective at...
5 Essential Email Security Tips for Businesses
5 Essential Email Security Tips for Businesses
2016 was a year of increasing email security risks for businesses. Phishing is still a common threat, but it took a backseat to email cybercrime,...
13 Reasons to Update Your Outdated Data Security Policy Right Now
13 Reasons to Update Your Outdated Data Security Policy Right Now
Updating your data security policy isn't just a smart way to mitigate risks, it's necessary for compliance. If your policy is severely out-of-date,...
3 Information Security Threats Caused by New Office Technology
3 Information Security Threats Caused by New Office Technology
Your information security strategy includes attention to endpoints and patching, but are you aware of the risks associated with your firmware? Your...
3 Easy Ways to Get the Most Out of a Small Information Security Budget
3 Easy Ways to Get the Most Out of a Small Information Security Budget
Though organizations have increased spending on security products and talent, many IT leaders may feel as if the increased spending doesn't keep up...
5 Lessons to Learn From GAO's Latest Information Security Assessment
5 Lessons to Learn From GAO's Latest Information Security Assessment
Federal agencies are at a staggeringly increased risk of information security attack. The U.S. General Accountability Office (U.S. GAO) released a...
5 Security Risks in Migrating to Office 365 — and What to Do About Them
5 Security Risks in Migrating to Office 365 — and What to Do About Them
Mitigating the security risks of cloud-based migrations requires both planning and thorough knowledge of product-specific obstacles. In a May 2015...