Insights

Last month was “business as usual” for cyber criminals. Even so, the volume and extent of these activities are mind-blowing — particularly with respect to the targeting of children, how easy cyber hacking skills can be transferred and cloud security. As computer professionals become aware of each incident, solutions eventually follow.

Over the past few years, many organizations have found themselves in a position where they have to defend their reputation due to the unauthorized release of sensitive data.