Cimcor Blog

The Real Price Tag of Retail Store Data Breaches
The Real Price Tag of Retail Store Data Breaches
Are retail data breaches a thing of the past? Hardly. In fact, Pricewaterhouse Cooper's (PwC) Global State of Information Security® Survey research...
The 10 Keystones of an Effective Endpoint Security Strategy
The 10 Keystones of an Effective Endpoint Security Strategy
Do you know what's on your employees' mobile devices? CyberEdge researchers believe mobile applications are the greatest risk to your company's...
5 Ways to Reduce Information Security Risk in a Mobile Workplace
5 Ways to Reduce Information Security Risk in a Mobile Workplace
Today's talent is no longer bound by the cubicle. For many, home offices and wi-fi enabled coffee shops are the new workplaces. Citrix writes that...
Human Factors in Regards to Cybersecurity
According to a recently published report from IBM Security services claims that 95% of security incidents include a human error element [1]. What are...
The Critical Lack of Women in IT Security
Enterprise is facing a major worldwide challenge that involves a lack of people qualified to staff positions in the information security field....
How secure is your organization?
According to research from the National Cyber Security Alliance (NCSA), over 65 percent of respondents from a recent poll confirmed that not only is...
NIST Releases Cyber Security Framework Core Update February 12th, 2014
On February 12th the National Institute of Science and Technology (NIST) published their recent updates to the Cyber Security Framework Core. A year...
Snapchat Ignores Security Vulnerability and Suffers the Consequences
Snapchat, the popular mobile photo-sharing service, suffered a major information security data breach that involved millions of its users. When the...
Have a secure New Year!
The Cimcor team hopes the holidays have found you well! As we head into 2014, we pause to think about all the incredible cyber security news that has...