Previous Blogs

Avatar

By Global Information Technology

December 12, 2013

For those of us who have been using social media for a while, it’s inevitable to have received a request to connect from someone whom you don’t know. While it can be tempting to accept the request to expand your social network and open up new horizons, you could also be exposing yourself and others connected to you to a malicious social engineering risk. If you’re not familiar with the term, a social engineer runs what used to be called a “con game.” For example, a person using social engineering might try to get you to reveal sensitive information, known as phishing.

Avatar

By Global Information Technology

February 12, 2013

Beyond the challenges of ensuring that data privacy laws are observed across the globe, West IT is faced with the need to safeguard intellectual property, trade secrets, and confidential company and employee data while ensuring that we can serve our global customers. This is becoming increasingly more complex with the rapid advances in mobility and cloud computing. At West, IT is evaluating the best way to enable our employees to take advantage of these rapid advances in technology while still ensuring protection for confidential company information.