SecurIT360 Blog

In-depth IT and cybersecurity news and education

Compliance|Information Security|Research

Budgeting For Security

Security budgeting is a layered approach Security is important, for an organization, and its customers. However, there is often a misconception that security costs are

Compliance|Research

Ebola: Is Your Organization Prepared?

All organizations should have a business continuity plan.  I know that many do not.  How will your business respond if: Your building burns down A

Information Security|Social Engineering>Phishing|Compliance>Privacy

Phishing and FIFA

I have some friends staying with me right now from Brazil.  They arrived a few days ago, and said that, due to the world cup,

Research>The Hitlist

The Hitlist: BYOD

“Bring Your Own Device” or BYOD is becoming an ever increasing topic among CIOs and other executives.  We are not here to argue the merits

Research>The Hitlist

The Hitlist: Perimeter Network Security Part 2

Part 1 of our “Perimeter Network Security” Hitlist covered the virtual considerations one must consider when securing their network.  Now, we will cover the things

Research>The Hitlist

The Hitlist: Perimeter Network Security Part 1

To “completely” secure an enterprise network is a very complex, and often, nearly impossible task.  There are several different factors that come into play that