CertainSafe Blog

 

2015: The Year of Data Security

February 17, 2015
2015: The Year of Data Security

The start to a new year allows for fresh perspective on past accomplishments and areas of opportunity. It’s also a time to look ahead and prepare accordingly. With cyber-security threats at their highest peak moving into the New Year, safeguarding sensitive data from cyber-criminals is vital. To ensure a secure…
[ Read More… ]

 

Partner with the Silver Bullet of Cyber Terrorism in 2015 and Beyond

January 30, 2015

Unfortunately, it takes a data breach to wake up a company. At this point, it’s already too late to recover stolen information, financial records and employee history. Recent cyber-attacks on well-known companies have businesses both small and large seriously considering security options. Let this be the year you invest in…
[ Read More… ]

 

Happy Holidays from CertainSafe!

December 22, 2014

As the year comes to an end, and everyone travels home for the holidays, we think about what we are grateful for. Our relationship with you is something we treasure and value. Thank you for the incredible opportunity to help service your needs. We wish you a very happy holiday…
[ Read More… ]

 

CertainSafe® has been bestowed the honor of receiving PC Magazine’s coveted Technical Excellence Award!

December 15, 2014

Our unparalleled technology has been recognized as the most secure and easy to use, according to the Technical Excellence award from PCMagazine.com. If you are user of many other file sharing BOX platforms, BEWARE and be on the lookout for statements such as this: “XxXxXxXxXx does not currently have HIPAA,…
[ Read More… ]

 

9 Cyber Security Tips for Small Business

December 08, 2014

More criminals today are choosing to target small businesses in order to access sensitive data. Hackers are aware that a small business will likely lack the personnel and resources necessary for implementing and handling an information security system. There are many precautions small businesses can take to protect their data:…
[ Read More… ]

 

A New Era of Tech Protection-California Passes Law to Protect its Citizens from Data Breaches

November 20, 2014

Jerry Brown, the Governor of California, signed Assembly Bill, 1710, into law on September 30, 2014. The amendment has brought many changes to the existing laws on personal privacy.   Changes to these laws enacted by Assembly Bill 1710 include a medley of provisions. Some of the requirements involve mitigation…
[ Read More… ]

 

Security Breach Involving Retirees of Arizona State’s Retirement System

November 06, 2014

A security breach may have caused approximately 44,000 state retirees to have their personal data compromised. The Arizona State Retirement System (ASRS) is spending nearly $291,000 to provide identity theft protection services. All of the affected retirees were enrolled in the Arizona State Retirement System dental plans. Notification of the…
[ Read More… ]

 

JP Morgan Experiences Security Breach

October 14, 2014

In what is becoming an all too common scenario, JP Morgan announced that the cyberattack, which was previously reported in July, affected millions of consumers and millions of small business owners. The admission was made public when the corporation officially reported the breach to the Securities and Exchange Commission.  …
[ Read More… ]

 

More Sophisticated Cyber Defenses Needed for U.S. Defense

October 07, 2014

For decades, cyber-attacks have been getting increasingly sophisticated and frequent. While hackers were once associated with ideological youngsters, today’s sophisticated hackers have become agents of foreign espionage. With Internet usage becoming increasingly widespread, ordinary users lacking advanced technical skills complete their work online. Unfortunately, these people do not understand how some of…
[ Read More… ]

 

What the Recent Celebrity Photo Hack Can Teach Businesses and Consumers

September 19, 2014

If you’ve been following the news lately, you have probably heard that a number of celebrities have had sensitive photos leaked on the Internet. It is believed that the photographs were obtained by hackers who were able to perform a brute force attack on Apple’s cloud storage service. This recent…
[ Read More… ]