Hotel WiFi access

Travelers Expect More Technology from the Hospitality Industry

(A 2 minute read…) Travelers are hitting the road and surrounding themselves with smartphones, tablets, laptops, electronic readers, smartwatches, etc. You see, Generation-Y and Generation-Z members grew up surrounded by technology. Some even say their cell phones act as a “third limb” and they cannot live without technology. Many of these now adult travelers were …

Travelers Expect More Technology from the Hospitality Industry Read More »

IoT Security Risks: 4 Steps to Create a Cyber Risk Management Plan

  Welcome back to the second installment in our series on IoT security risks. In part 1, we discussed the security vulnerabilities associated with embedded devices that are connected to the Internet of Things (IoT). Today, we will explore the cyber risks that your organization may face and address some proactive steps that you can …

IoT Security Risks: 4 Steps to Create a Cyber Risk Management Plan Read More »

How to Fix 5 Common Human Errors that Lead to Security Threats

Human error is involved in 95% of security breaches. A seemingly simple mistake can lead to a major disaster. The 2015 Cost of Data Breach Study reported that human error was responsible for 25% of the data breaches that occurred in the US, resulting in an average mitigation cost of $198 per capita, and an …

How to Fix 5 Common Human Errors that Lead to Security Threats Read More »

cloud computing

How Secure is the Cloud for Enterprise Computing?

Businesses are facing a challenge with their enterprise computing. Should they go to the cloud or keep their data on a “secure” in-house server? Every time a major data breach is reported (e.g., Target in 2013, Home Depot in 2014), decision-makers challenge the cloud’s security. In reality, those data breaches were caused by human error, …

How Secure is the Cloud for Enterprise Computing? Read More »

containterization for mobile device security

6 Tips to Help You Build a Secure BYOD Policy

Consumer-styled devices—like smartphones and tablets—have blurred the lines between personal and professional lives. We’re so connected with these mobile devices that we take them everywhere, and using them for work purposes has become a natural extension. Many corporations accepted the use of employee-owned devices, and even gave the practice a name: Bring Your Own Device …

6 Tips to Help You Build a Secure BYOD Policy Read More »

cyber security

Cyberthreats 2016: How can you protect your business?

The average cost of a data breach was $3.8 million in 2015. This is a 23% rise in just two years, according to an IBM report—$154 per record. Healthcare pays a higher price, estimated at $363 per record, because the data in a medical record is more extensive than that associated with a credit card. …

Cyberthreats 2016: How can you protect your business? Read More »

big data and the 2016 presidential campaigns

How is big data driving the 2016 presidential campaigns?

Who’s mining the polls? If you doubt that Big Brother is watching, open your eyes wider. Big data is getting bigger. Thanks to the proliferation of mobile devices and apps, there is more accessible personal information about you than ever—from your browsing preferences to your location at any given time. Retailers know when you’re close …

How is big data driving the 2016 presidential campaigns? Read More »

Contact Us

We’re happy to answer any questions you may have.
We will send you an email to confirm the form was submitted successfully. 

ltron logo
  • 7911 Lehigh Crossing
  • Suite 6
  • Victor, NY 14564
EMAIL:
PHONE:
FAX: