Call Us Today!302-652-3370|Client Login| info@ssdel.com
SSD Technology Partners|Managed IT Services Logo SSD Technology Partners|Managed IT Services Retina Logo SSD Technology Partners|Managed IT Services Mobile Logo SSD Technology Partners|Managed IT Services Mobile Retina Logo
  • Who we serve
    • Law Firms
    • Healthcare
    • Financial Services
    • Nonprofit & Associations
    • Other Industries
  • IT Solutions
    • Unlimited Support
    • Cybersecurity
    • Managed Services
    • Consulting Services
    • Software Development
  • Our Approach
    • Your IT Team
    • Onboarding Process
    • Best Practices
  • About Us
    • Our Story
    • Executive Leadership
    • Our Team
    • Community
    • Careers
  • Blog
  • Contact Us

Internet Security

Home/Posts/Internet Security
  • ‘eFAIL’ Flaw Illustrates Need for New Email Encryption Solutions
    Gallery

    ‘eFAIL’ Flaw Illustrates Need for New Email Encryption Solutions

    Cyber Security, Internet Security, IT Security

‘eFAIL’ Flaw Illustrates Need for New Email Encryption Solutions

By The SSD Team| 2018-08-01T23:41:23+00:00 July 23rd, 2018|Cyber Security, Internet Security, IT Security|

Email is a great business communication tool because it is fast, easy and inexpensive. Privacy has never been among its better features, however, and recently discovered vulnerabilities in common email encryption technologies cast even more doubt on the confidentiality of the messaging platform. Emails have always been prone to data theft and data leakage because [...]

Read More
 0
  • Shopping Online: 5 Ways to Proceed With Caution
    Gallery

    Shopping Online: 5 Ways to Proceed With Caution

    Internet Security

Shopping Online: 5 Ways to Proceed With Caution

By Rebecca Ruocco| 2018-06-27T17:31:04+00:00 June 27th, 2018|Internet Security|

Shopping online has grown increasingly popular, especially since we have the ability to browse and shop right from our smartphones and tablets! As simple and satisfying as it is to just click a few times on our devices and have items shipped to us within a few days, there are certain risks associated with this [...]

Read More
 0
  • 3 Security Threats You Need to Prioritize Today
    Gallery

    3 Security Threats You Need to Prioritize Today

    Internet Security, IT Security, Security

3 Security Threats You Need to Prioritize Today

By The SSD Team| 2018-06-21T18:36:39+00:00 June 21st, 2018|Internet Security, IT Security, Security|

The current, constantly changing cybersecurity threat climate has turned security personnel into walking stress balls. Every time they see a new headline about a new breach involving a major retailer, financial institution, social media platform or healthcare organization, they wonder if their defenses are strong enough. They wonder if their organization will be next. When [...]

Read More
 0
  • What Does It All Mean?! 8 Security Risks Defined That Exist in the Cyber-World
    Gallery

    What Does It All Mean?! 8 Security Risks Defined That Exist in the Cyber-World

    Cyber Security, Internet Security, IT Security, IT Services, Security

What Does It All Mean?! 8 Security Risks Defined That Exist in the Cyber-World

By Rebecca Ruocco| 2018-06-08T18:56:32+00:00 June 8th, 2018|Cyber Security, Internet Security, IT Security, IT Services, Security|

We are familiar with the malicious activity that exists in the cyber world; however while many of us hear about security breaches and cyberattacks, most of us do not know the “what” behind the end result. Below are eight of the common security risks that exist: Bot: Bot is a program that is remotely triggered [...]

Read More
 0
  • 9 Tips for Improving Mobile Security
    Gallery

    9 Tips for Improving Mobile Security

    Cyber Security, Internet Security, Mobility, Security

9 Tips for Improving Mobile Security

By The SSD Team| 2018-05-16T21:54:16+00:00 May 16th, 2018|Cyber Security, Internet Security, Mobility, Security|

Mobile technologies have profoundly changed how organizations conduct business, share information and interact with customers, employees and partners. However, the increased use of smartphones and other mobile devices for business purposes has created significant potential for security breaches. Studies find that organizations are surprisingly cavalier about the security of these devices. Although 93 percent of [...]

Read More
 0
  • Understanding Access Control and How to Reduce Cybersecurity Risk
    Gallery

    Understanding Access Control and How to Reduce Cybersecurity Risk

    Cyber Security, Internet Security, Security

Understanding Access Control and How to Reduce Cybersecurity Risk

By The SSD Team| 2018-05-03T04:32:39+00:00 May 3rd, 2018|Cyber Security, Internet Security, Security|

Given the perilous threat climate that continues to expose the sensitive data of many of the world’s best-known organizations (and their customers), the amount of attention given to who can access what data is often shockingly low. Highly sensitive financial information may be strictly controlled, but other types of data are often left “wide open.” [...]

Read More
 0
  • How Should You Invest Your Cybersecurity Dollars?
    Gallery

    How Should You Invest Your Cybersecurity Dollars?

    Cyber Security, Internet Security, IT Security, Security

How Should You Invest Your Cybersecurity Dollars?

By The SSD Team| 2018-03-14T18:30:11+00:00 March 14th, 2018|Cyber Security, Internet Security, IT Security, Security|

Many business executives view cybersecurity as a technical problem to be handled by the geeks in the IT department. However, cybersecurity is very much a business problem that demands thoughtful investment and a strategic approach. Generally speaking, cybersecurity can be broken down into four major categories: prevention, education, detection and response. Prevention encompasses many of [...]

Read More
 0
  • Every Second, 58 Data Records Are Stolen. The Cost Is Staggering.
    Gallery

    Every Second, 58 Data Records Are Stolen. The Cost Is Staggering.

    Cyber Security, Internet Security, IT Security, Security

Every Second, 58 Data Records Are Stolen. The Cost Is Staggering.

By The SSD Team| 2018-03-02T17:42:43+00:00 March 1st, 2018|Cyber Security, Internet Security, IT Security, Security|

According to the Breach Level Index, nearly 5 million data records are stolen each day, which equates to 58 records every second. Of course, these figures only account for known and reported breaches. While high-profile incidents involving household names like Equifax and Yahoo make headlines, smaller data breaches are often kept under wraps. Also, the [...]

Read More
 0
  • Remote Monitoring Boosts Cybersecurity
    Gallery

    Remote Monitoring Boosts Cybersecurity

    Internet Security, IT Security, Security

Remote Monitoring Boosts Cybersecurity

By The SSD Team| 2018-02-26T15:52:59+00:00 February 26th, 2018|Internet Security, IT Security, Security|

Ransomware. Malvertising. Phishing. Distributed Denial of Service. All variants of cyberattacks seem to be growing to record levels, putting the pressure on network administrators to detect and mitigate threats. Remote network monitoring solutions can relieve the pressure and dramatically improve your ability to keep cybercriminals at bay. In a recent survey of IT professionals conducted [...]

Read More
 0
  • Tips for Avoiding Social Media Risks in Your Business
    Gallery

    Tips for Avoiding Social Media Risks in Your Business

    Internet Security, IT Security, Security

Tips for Avoiding Social Media Risks in Your Business

By The SSD Team| 2018-02-16T19:30:40+00:00 February 16th, 2018|Internet Security, IT Security, Security|

Most users have at least some sense of the risks posed by social media. Businesses face many of those same risks, as well as other threats that can increase the odds of a successful security breach. Thieves often use Facebook posts to find houses to burglarize while families are on vacation. Similarly, hackers mine LinkedIn [...]

Read More
 0
Previous 1 2 3 4 Next

Subscribe to Email Updates

Recent Posts

  • Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users
  • New Research Paints an Ugly Picture of Endpoint Security
  • Why Nonprofits Are Targets for Hackers and What You Should Do About It
  • 5 Questions to Ask When Considering Custom App Development
  • SaaS or Custom App? How to Choose the Right Model

Posts By Topics

  • Artificial Intelligence (1)
  • Backup Recovery (6)
  • Big Data (3)
  • Business Continuity (3)
  • BYOD (6)
  • Cloud computing (21)
  • Collaboration (7)
    • Customer-Centric (1)
  • Custom Application Development (10)
  • Cyber Security (58)
  • Data Analytics (2)
  • Data Governance (2)
  • Data Storage (3)
  • Digital Transformation (2)
  • Disaster Recovery (2)
  • Email (3)
  • Internet Security (56)
  • IT budgeting and planning (21)
  • IT Management (26)
  • IT Outsourcing (4)
  • IT Security (74)
  • IT Services (15)
  • Managed Services (38)
  • Mobility (7)
  • Network Infrastructure (8)
  • Regulatory Compliance (4)
  • Security (77)
  • SMB Strategies (28)
  • Software Development (3)
  • Software-as-a-service (3)
  • Storage (1)
  • Technology (9)
  • Uncategorized (9)
  • Unified Communications (2)
  • Videos (3)
  • Virtualization (1)
  • VoIP (2)
  • Wi-Fi (5)
  • WLAN (1)

Contact Us

1024 Justison Street
Wilmington, DE 19801

Phone: 302-652-3370

Fax: 302-652-4591

Email: sales@ssdel.com

SSD Technology Partners

Since all businesses have different needs, our IT Consulting professionals can provide unique IT Solutions to fit the specific needs of your organization. Whether it is Managed IT Services, Software Development, Security Services or Cloud Computing, we are driven to provide superior service to give you the freedom to focus on the core purpose of your business.

Recent Posts

  • Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users
  • New Research Paints an Ugly Picture of Endpoint Security
  • Why Nonprofits Are Targets for Hackers and What You Should Do About It
  • 5 Questions to Ask When Considering Custom App Development
  • SaaS or Custom App? How to Choose the Right Model

Recent Tweets

  • Most passwords are ineffective at preventing unauthorized access. Here are tips for improved password management.… twitter.com/i/web/status/1…

    20 hours ago
  • Mixing on-premises and cloud services can be challenging. Here’s how to ensure the success of your hybrid #cloud.… twitter.com/i/web/status/1…

    22 hours ago
  • Does your wireless network deliver the performance and capacity you need? Proper planning, management and troublesh… twitter.com/i/web/status/1…

    2 days ago

Categories

  • Artificial Intelligence
  • Backup Recovery
  • Big Data
  • Business Continuity
  • BYOD
  • Cloud computing
  • Collaboration
  • Custom Application Development
  • Customer-Centric
  • Cyber Security
  • Data Analytics
  • Data Governance
  • Data Storage
  • Digital Transformation
  • Disaster Recovery
  • Email
  • Internet Security
  • IT budgeting and planning
  • IT Management
  • IT Outsourcing
  • IT Security
  • IT Services
  • Managed Services
  • Mobility
  • Network Infrastructure
  • Regulatory Compliance
  • Security
  • SMB Strategies
  • Software Development
  • Software-as-a-service
  • Storage
  • Technology
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • VoIP
  • Wi-Fi
  • WLAN

Subcribe Now

Copyright 2015 - 2017 SSD Technology Partners - 1024 Justison Street, Wilmington, DE 19801 Phone: 302-652-3370
| Site Maintained by Skillful Antics
FacebookLinkedinTwitter