Northstar IT

(360)­ 715-3330
Bellingham / Whatcom County

10 Security Questions to Ask Cloud Vendors

 

BST DI CoverStory 2012 TempAs more businesses  are taking advantage of the benefits of cloud services, evaluating the information security posture of a potential cloud provider is essential, but can often seem like an exercise in futility. If you are going to trust a third party you need to hold their feet to the proverbial fire by undertaking proper due diligence. Before deciding to engage with a cloud provider, ask them to answer (truthfully) this security questionnaire to gauge their information security maturity.

Read more

Make sure BYOD doesn’t mean ‘Bring Your Own Disaster’

BYOD photoThe idea behind BYOD (“Bring Your Own Device”) is that employees can use a personal device such as a tablet for both personal and business use. As you can imagine, the scenario of users bringing in their own devices to connect to a corporate network gives visions of malware and/or other bugs spreading through the corporate network. This has led to some people dubbing BYOD as “Bring your Own Disaster”. As with many areas in IT, however, you can set some rules that should minimize the security risks of BYOD.

Read more