OutSecure, Inc.

Blog

Helping Boards Navigate the Cyber Threat Landscape

Corporate Boards need to ensure that Management is fully-engaged in identifying & developing defense and response plans to current and future cybersecurity threats – or risk putting their company’s core assets ...

Cyber Security Steps for Mergers & Acquisitions

Photo Source: Yenwen Feng – The slogan on the remodeled wall of Tiffany on Wall St You are considering investing or acquiring a company and you have a team of advisors ...

Hotel Security: You can check out any time you like..

Photo source: Flickr But you can never leave. Secure lodging and reputation are paramount for hotels of any size. Protection and maintenance of assets including human, physical and other intangible assets is ...

Security on a budget : Stop! Before you spend a dollar on Security!

Photo Source: Bill Brooks In today’s cybersecurity threat landscape, all companies regardless of vertical, size or complexity require a strategic security approach. To protect their business, their customers, their business partners. There are two reasons that companies today don’t have ...

Is Your Business The Next Target?

By Pamela Gupta If a data breach is inevitable for any business, and it is – what measures do you have to take now to minimize the impact on revenue, reputation and cost involved in the aftermath? When thieves hacked ...

Facebook you have 2 security pokes and 1 message

By Pamela Gupta | September 2, 2013 In August, a Palestinian Facebook user, known as Khalil, found a flaw that allowed someone to post on any other user’s Facebook wall, even without ...

CEO and CISO conversations that are not happening…

By Pamela Gupta | June 6, 2013 Businesses need to protect their information.  We don’t need hackers and state driven cyber-attacks to recognize that for a  business to succeed and maintain ...

Is Your Data Backed Up?

It might come as a surprise, but many small businesses and even some medium-sized businesses struggle when it comes to properly managing data. Small business owners are often unaware of proper ...

Evernote Introduces Three New Security Features

Everyone’s talking about two-step authentication, and only a select few companies are actually using it. However, as the process becomes more familiar to the public, it’s becoming more prominent. Yesterday, Evernote ...

Google Breached, Sensitive Data May Have Been Lost

In 2010, Google’s servers were hacked by Chinese hackers in attempts to get a hold of information that was private, US officials said. For the past three years, the government has ...

Contact

OutSecure, Inc.OutSecure, Inc. Logo $$$