Blog: IT security

Karin Teles, DP&C – Services & Support

Cetrom’s services and support really stood out against the other cloud vendors. We thought their Citrix delivery platform would have a higher level of adoption because our employees would have the same desktop setup that they have grown accustomed to using– and it has. Cetrom also stressed the importance of their backups, data redundancies and... Read More

Are you who you say you are?

Controlling access to information is the key objective of computer security measures. And, a fundamental aspect of security is determining whether users are who they say they are when they attempt to log into accounts. Blue Cross Blue Shield/Anthem, Equifax, Verizon, U.S. Securities and Exchange Commission, Deloitte and Whole Foods Market represent data breaches happening... Read More