Skip to content

SECURITY

HIPAA Compliance

A HIPAA Compliance Checklist for the Cloud Era

The only way to keep PHI secure is to build a secure system from day one, but that’s not exactly easy. After all, HIPAA is a complicated piece of legislation. This complete HIPAA compliance checklist from guest contributor and Virtru Founder and CTO Will Ackerly will get you started.

BetterCloud
6 min read
Spanning by EMC - Ransomware

Ransomware is on the Rise: Is Your SaaS Data Protected?

Ransomware isn’t an empty threat–it’s real, and no organization is immune. As an IT professional, putting safeguards in place is essential to ensuring your data is protected. Are you prepared should the worst happen to you?

BetterCloud
3 min read

If You're Not Phishing Your Employees, You Should Be: Here's How

Phishing is a dangerous ever-growing threat to your organization. Putting technology in place can help, but educating and testing your employee base is best. BetterCloud Sr. Application Security Engineer Austin Whipple explains how you can pull off an internal phishing campaign to keep employees on their toes.

Austin Whipple
4 min read

Hacker Psychology: Understanding the 4 Emotions of Social Engineering

Social engineering is a powerful (and persuasive) skill that hackers use to manipulate their targets. But which emotions are hackers actually trying to exploit, and what can you do to stop them?

Austin Whipple
4 min read

Growing Pains: Latest Research Shows IT Struggling to Meet SaaS Application Demand

Once they have ’em, they can’t get enough. Explosive demand for SaaS applications leaves IT scrambling to meet the demands of their end users.

Christina Wang
5 min read
Social Engineering

How to Recognize and Prevent Social Engineering Attacks

Phishing scams make breaking news at a dizzying pace, but there are other ways hackers use social engineering to steal your data. Learn how to prevent the most sophisticated attacks.

Christina Wang
34 min read
Cloud Partners

8 Reasons Why You Should Change The Way You Think About Cloud Partners

Through our 2015 Trends in Cloud IT research, we found that today’s cloud-enabled organizations use…

Christina Wang
4 min read

Information Security and Pop Culture: How Real-Life Social Engineering Techniques are Used in Movies and Television

Social engineering isn’t reserved for hackers. It’s a common con used in many acclaimed films and television series.

Christina Wang
6 min read
monthly poll Feb - Real-time Messaging

Real-Time Messaging: Data Unearths Surprising Findings on Usage, Distraction, and Organizational Impact

Real-time messaging has changed the way employees communicate, mostly for the better. However, there’s surprising data we uncovered that shows another side, which isn’t quite as rosy.

Christina Wang
7 min read

How the IT Guy Became the “It Guy”: The Evolving Portrayal of Tech Professionals in Movies and Television

The “IT nerd” image is hard to shake; Hollywood has plastered it into our collective consciousness for years. We go in-depth to show how IT’s image has evolved.

Christina Wang
9 min read