Data Security

#Humans-Vs-TheMachine: Privacy and Security in the Information Age Part 3

By | 2016-12-06T15:47:40+00:00 October 28, 2016|Categories: Fusion Blog|Tags: , , , , , |

The first two missives in this series focused on the eroding right of privacy, its effect on human congress, and in particular, its effect on the global markets in which we work. The first blog explored an Apple vs. FBI case, in which the FBI was asking Apple to hack its own phone in pursuit [...]

#MicrosoftVsDOJ: Data Privacy & Security in the Information Age Part 2

By | 2016-12-06T15:47:42+00:00 July 21, 2016|Categories: Fusion Blog|Tags: , , , , , |

In our first post in this series, we discussed the recent Apple vs. FBI case in which the FBI was asking Apple to hack its own phone in pursuit of the perpetrators of the San Bernardino terror attack. Though the complaint was withdrawn, government, business, and individuals will be wrestling with the contradictory impulses of [...]

FIA Transformative Trends in Technology

By | 2017-04-13T15:52:37+00:00 June 20, 2016|Categories: Cloud Posts, News and Views|Tags: , , , , , |

The FIA Technology Committee held their annual election and panel discussion in Chicago last week and for the second year in a row, the panel consisted of speakers from distinctly different disciplines that have recently been in the spotlight for financial technology (or “fintech”). Following introductory remarks from Rumi Morales of CME Ventures, the panel took turns [...]

Maven Wave Partners with Virtru for Google Apps Encryption

By | 2017-04-13T16:23:11+00:00 June 2, 2016|Categories: Fusion Blog, Google Apps Posts|Tags: , , , , |

Data security remains the single biggest concern for enterprises considering a move to the cloud. Companies want the cost savings and collaboration afforded by platforms like Google for Work, but they often require more enhanced security and control than what the platform provides by default. That’s why Maven Wave is excited to introduce our newest [...]

#AppleVsFBI: Privacy and Security in the Information Age

By | 2016-12-06T15:47:43+00:00 May 1, 2016|Categories: Fusion Blog|Tags: , , , , , |

In February 2016, the FBI obtained a court order compelling Apple to assist in the investigation of the December 2015 San Bernardino terrorist attacks by hacking Syed Rizwan Farook’s government issued iPhone 5c. Relying on a centuries old law which authorizes the United States federal courts to "issue all writs necessary or appropriate in aid [...]

15 Ways Google Enhanced Data Security in 2015

By | 2016-12-06T15:47:45+00:00 December 28, 2015|Categories: Fusion Blog|Tags: , , , , , |

Google worked hard in 2015 to ensure stronger, simpler security of your data in Google Apps. Because security has always been a top priority for Google, they're continuously working to stay ahead. Here are the 15 steps that Google took to enhance data security at work in 2015. Security keys make two-step verification easy and [...]

US-EU Safe Harbor Struck Down – What Does It Mean

By | 2016-12-06T15:47:50+00:00 October 20, 2015|Categories: Fusion Blog|Tags: , , |

Recently, Europe’s highest court struck down the US-EU Safe Harbor agreement, which allowed for the free flow of personal information between the EU and the US. This decision impacts US companies with operations in Europe, and who process personal data that is subject to European Data Protection laws. While not the only legal mechanism through [...]

How Android for Work Makes BYOD a Reality

By | 2016-12-06T15:47:53+00:00 March 24, 2015|Categories: Fusion Blog|Tags: , , , , , , , |

Employees are increasingly using the devices, applications, and services that they rely on in their personal lives to get work done. In fact, 90% of enterprises say that the use of consumer services for work is pervasive today (services like Dropbox, Skype, LinkedIn, Google, etc). 41% of the time, these services are being used without [...]

Guiding Technology Trends for 2015

By | 2016-12-06T15:47:53+00:00 January 20, 2015|Categories: Fusion Blog|Tags: , , , , , , , , |

As we settle into 2015 with a fresh outlook and new goals, we have been following some key technology trends that are shaping the future of our client’s businesses, as well as our own. As the technology landscape continues to evolve rapidly, businesses must remain agile and willing to adapt. Changes in mobile, data security, [...]

Protect Your Domain from a Security Breach

By | 2016-12-06T15:47:55+00:00 September 11, 2014|Categories: Fusion Blog|Tags: , , , |

Yesterday, Gmail was the target of a security breach that left 5 million Google customers exposed. The Gmail addresses and passwords were most likely compiled through phishing scams, use of weak passwords, and other common compromises, not as a result of a hacked Google server. Even if your email address is on the list, chances are the [...]