Picking A Sensible Mobile Password Policy

Defining an enterprise mobile device passcode policy can be surprisingly difficult. Security managers must attempt to reconcile two opposing goals. They must create a passcode policy that is strong enough to protect the device if it is lost or stolen, while not annoying users with needless length or complexity.

Spotlight

Innové

In 2015 Innové celebrates over a decade of excellence in the delivery of trusted strategy and technology solutions. Established within the aerospace and defense industry, Innové was recognized by INC. Magazine in both 2008 and 2009 as one of the fastest growing companies in the U.S. and named among the Top 50 private companies in San Antonio by the San Antonio Business Journal in 2010. We are a team of passionate people that aim to deliver top line and bottom-line results for our clients. Innové values client relationships. We aim to understand and help clients accomplish their goals using a solution-centric delivery approach. Success and partnership come when we deliver solutions using the right combination of best in class people, process, and technology to create extraordinary impact. We pay close attention when building client relationships and discovering client needs in order to help eliminate inefficiency and drive exceptional client satisfaction.

OTHER WHITEPAPERS
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More

Spotlight

Innové

In 2015 Innové celebrates over a decade of excellence in the delivery of trusted strategy and technology solutions. Established within the aerospace and defense industry, Innové was recognized by INC. Magazine in both 2008 and 2009 as one of the fastest growing companies in the U.S. and named among the Top 50 private companies in San Antonio by the San Antonio Business Journal in 2010. We are a team of passionate people that aim to deliver top line and bottom-line results for our clients. Innové values client relationships. We aim to understand and help clients accomplish their goals using a solution-centric delivery approach. Success and partnership come when we deliver solutions using the right combination of best in class people, process, and technology to create extraordinary impact. We pay close attention when building client relationships and discovering client needs in order to help eliminate inefficiency and drive exceptional client satisfaction.

Events