|
|
|
Displaying 1 to 10 of 16 articles |
Next >
|
Pages:
1
2
|
Articles by skyhigh networks |
1. 6 Sneaky Terms Cloud Services Bury in their User Agreements
November 11, 2013
When you sign up for cloud services or applications, do you read the terms and conditions before you accept them? If you are like most humans, you probably skim the T’s & C’s and quickly click “I agree” to move on.
Who’s really going to read all 36,275 words of PayPal’s terms and conditions...
|
|
|
2. A New Business Case for "Why IT Matters" in the Cloud Era
November 01, 2013
Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it into a cloud-based file sharing service and get back to work...
|
|
|
3. Securing Cloud Data without VPNing, Hammer Pants, or Hairspray
October 25, 2013
There are things that should make a comeback NOW. And then there are things that should NEVER make a comeback. One of the things that should definitely be on the “Please Never Make a Comeback” list is VPN. You remember “VPNing”, right? You want to send a quick email or check a docu...
|
|
|
4. Beyond the Hype - The Hard Data on Enterprise Cloud Usage
October 04, 2013
How pervasive is the use of cloud services? What are the most widely used file sharing services? Which widely used present the greatest risk to my organization? Is the adoption of clouds services rampant among companies like mine or is it primarily a Silicon Valley phenomenon?
These are a sa...
|
|
|
5. Watering Hole Attacks: Protecting Yourself from the Latest Craze in Cyber Attacks
September 26, 2013
Cyber criminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisticated enterprises and government ...
|
|
|
6. Beyond Encryption: The 5 Pillars of Cloud Data Security
September 19, 2013
Given the recent influx of cyber-security attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation authorized by the U.S. government in whic...
|
|
|
7. Enabling Cloud Service Adoption Through Frictionless Corporate Data Protection
September 05, 2013
In a casual discussion last weekend my teenage daughter observed that human evolution is slowing down because technology allows us to compensate in areas in which nature otherwise would have extinguished those genes. We can discuss the merits of that observation some other time but it got me think...
|
|
|
8. How to Secure Your Data in the Cloud
August 22, 2013
The benefits of the cloud are well publicized: reduced cost, faster time to market, and transitioning from Capex to Opexto name a few. But over the last 5 years, IT departments have been surprisingly slow to fully embrace the cloud. Their number one concern: security of corporate data in the cloud. ...
|
|
|
9. Best ways for securing your data in cloud
August 16, 2013
Minimize the Risk of Data Breaches Almost every week you hear of a high profile company that has suffered a security breach, exposing sensitive customer data. Data breaches can impact your organization’s reputation, lead to loss of business, and even result in fines. While cloud services may...
|
|
|
10. Understanding of cloud usage and creating data security policy to avoid risk
August 13, 2013
Understand Your Cloud Usage and Exposure “Check this box to agree to the terms and conditions of this website/app/service.”No doubt you’ve seen this countless times, but do you read the 30-page terms and conditions every time you sign up for a new cloud service? When it comes to your company...
|
|
|
|
|
|
>
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|