Research Reveals That Businesses Place Low Priority on Print Security Despite 60% Admitting to Experiencing Print-Related Data Breach

By Louella Fernandes • on April 9th, 2014 • in Articles  Quocirca research reveals that enterprises place a low priority on print security despite over 60% admitting that they have experienced a print-related data breach. Any data breach can be damaging for any company, leaving it open to fines and causing damage to its reputation and undermining customer confidence. In […]

technology 2

How to Create a Strong Password and Why You Should Do This Now

Are you using simple passwords such as password, abc123, orqwerty? Do you write your passwords on a Post-It note you stick to your computer screen? Have you been using the same password on multiple accounts? Or do you create passwords that are unique and strong for each of your online accounts?   The recently discovered Heartbleed Internet bug put […]


Passwords Are the First Step to Internet Safety

Passwords: The first step to safety Most people don’t put a lot of thought into creating a password. It’s usually easiest just to create a short, easy-to-remember password, or even just to use the same password for every account. After all, the average person probably won’t be able to guess your password. However, hackers often use password-cracking software […]


6 Rules of Business Data Protection

If the hard drive on your server failed, how fast could your business recover? What if your business burned to the ground? Business data is the most valuable asset any business has – but many are cavalier about protecting it. Following these six rules of business data protection will ensure that your business is able […]

pile of hard drives

5 Digital Devices Used Every Day That Could Result in a Security Breach

Data breaches cost U.S. enterprises an average of $5.4 million per incident in 2012, according to the Ponemon Institute and Cintas Corporation. With the growing number of digital devices in today’s businesses, it is no longer sufficient to only secure data stored on documents or in computer files,” said Dr. Larry Ponemon, chairman and founder […]

Blog Posts

Available Pages


Archives by Subject: