CENTRI’s Data Protection Blog

It’s Time For A New Approach to DDoS Mitigation For Your Business

Any business that has found themselves under a DDoS attack knows just how damaging it can be. DDoS attacks can suspend the availability of your products or services for hours, sometimes even days, without the right security measures. What is a DDoS Attack? DDoS stands for distributed denial-of-service. This is an attack that hackers or … Continue reading It’s Time For A New Approach to DDoS Mitigation For Your Business

Read More

$750,000 HIPAA Settlement is a Harsh Reminder of the Need For Healthcare Data Security

A recent settlement between the Department of Health and Human Services’ Office of Civil Rights, or OCR, and Indiana-based Cancer Care Group is highlighting the importance of information security governing company policies. The two parties agreed to a $750,000 settlement after a data breach lead to the exposure of over 55,000 patients’ records. In 2012, … Continue reading $750,000 HIPAA Settlement is a Harsh Reminder of the Need For Healthcare Data Security

Read More

Best Practices: Encryption for Financial Services

Encryption for financial services is a highly effective way to achieve data security. It involves translating information into a secret code and having access to a secret password or key to read an encrypted file. The 2 main types of encryption are the following: Public-key encryption: utilizes 2 different keys at one time. Only your … Continue reading Best Practices: Encryption for Financial Services

Read More

Survey Shows Slow Down in Bring Your Own Device Trends

Industry watchers have been predicting a future boom in Bring Your Own Device (BYOD) policies in businesses. Gartner Research found that at least half of employers would require employees to provide their own devices by 2017. In addition, Mobile Device Management (MDM) has given birth to an entirely new market that’s expected to hit $4 … Continue reading Survey Shows Slow Down in Bring Your Own Device Trends

Read More

Educate Your Company on Three Key Areas of Data Security

A recent study by Dell found that 75 percent of organizations have experienced some sort security breach within the last year. However, only 18 percent have made predicting and detecting future threats a top priority. Unfortunately, security strategies tend to be more reactive than proactive. Is that an effective approach? Not at all. In fact, … Continue reading Educate Your Company on Three Key Areas of Data Security

Read More

Why Enterprise Security Needs New Perspectives & Tools

These days, the digital world can be a scary place for businesses. On top of the already complex issues businesses face, they must also rise to meet the increasing demands of security. The capabilities of digital hackers are evolving at a pace that outstrips almost every other aspect of the digital corporate universe. To make … Continue reading Why Enterprise Security Needs New Perspectives & Tools

Read More

Why SSL Alone Doesn’t Cut It Anymore

In the 1995 motion picture The Net, Sandra Bullock plays a system analyst whose social interactions occur mainly online within the confines of her computer screen. She telecommutes to work, disassembles computer games, and orders pizza online, all the while she chats with a friend over the phone. However, none of her computer prowess and … Continue reading Why SSL Alone Doesn’t Cut It Anymore

Read More

Waiting for the “Sh–IoT” to hit the fan

A lot has been written about the Internet of Things or IoT in the past several years. Tens of billions of connected devices around the world in the not too distant future. Huge improvements with new products and services from wearable devices to smarter oil rigs. Enhanced customer experiences. A giant market opportunity for a … Continue reading Waiting for the “Sh–IoT” to hit the fan

Read More

Think Like the Bad Guys: How CIOs Can Plan For Future Cyberattacks

On a recent vacation, my family and I went to Washington D.C. to visit all the great memorials, museums and government buildings that represent a lot of the history of this great country. Two of our favorite museums were the Crime Museum and the International Spy Museum. The International Spy Museum was filled with fascinating … Continue reading Think Like the Bad Guys: How CIOs Can Plan For Future Cyberattacks

Read More

The Three Little Pigs and Network Security

The Three Little Pigs is a timeless classic. You remember it, right? Three pigs. Two of them spent their time slacking off and built really flimsy houses out of sticks and straw. The third pig worked really hard and built a strong house out of brick. Once the big bad wolf comes calling, he makes … Continue reading The Three Little Pigs and Network Security

Read More