QPC Security

Educational Articles

The Fallacy of Size: Why IT Service Provider Competence Trumps Company Size

When it comes to selecting an IT service provider, many organizations make the mistake of equating competence with the size of the ...

Understanding Security Appliances

What is a security appliance A security appliance is a device that protects the perimeter and the inside of your ...

YubiKey with Password Safe

This article is all about how to enhance an already great password management tool with two-factor authentication. Authentication concepts Single-factor authentication ...

Why IRS Guidelines & FTC Safeguards for Protecting Taxpayer Data Are Not Just For Tax Professionals

Whether it is tax season or not, cybercriminals always have their sights on one of their most lucrative targets ‑ CPA and tax preparation firms‑ because they store, send, and receive Personally ...

How is your Social Networking Information being used - and by whom

Introduction There is no question that social media provides an easily accessible platform for connecting with people, building relationships, sharing ideas, and expanding businesses. All ...

Addressing Information Security Fundamentals with CIS and Community Defense Model

Importance of the approach Besides the obvious goal of trying to achieve Return On Security Investment (ROSI), it is important to be legally defensible or risk facing the consequences. A critical approach from the perspective of being laser-focused will help ...

Navigating Difficult Relationships

I received the following questions requesting advice on how to navigate difficult relationships. When you run into billing/payment issues with clients, what are your go-to ...

Hardware Firewalls

I regularly get questions regarding firewalls and network layer security strategy overall. I wrote this article to share those answers with a larger audience. Baseline ...

Paradigm Shift: Physical to Virtual Servers

Change in the business world is difficult. Change in the technologies utilized to operate businesses is overwhelming. It is not only the rate of change that is staggering. It is the massive quantities of new technologies that pose the biggest ...

Risks of Using Public Cloud

Cloud computing services have become a vital tool for most businesses. It's a trend that certainly has accelerated with the Pandemic as public cloud-based services such as Zoom, Microsoft 365 and Google Workspace became the collaboration and productivity tools of choice for ...

Contact

QPC SecurityQPC Security Logo $$$

Social Media