|Data Management is Key to Compliance|
|Anne Bisagno—Wednesday, July 19, 2017
Technology, the law, and the threat environment are changing so fast that achieving and maintaining regulatory compliance gets more complex and challenging
by the day. If your employees are doing an end run around compliance processes using shadow IT, that only compounds the problem.
|SMBs: the Sweet Spot for Phishers|
|Anne Bisagno—Wednesday, July 12, 2017
We've talked before about how SMBs are low-hanging fruit for cybercriminals: they have more to steal than individuals and weaker defenses than large companies.
Unfortunately, that's more true than ever.
|Big Dangerous Phish are Circling|
|Anne Bisagno—Thursday, July 06, 2017
Beware of a new type of phishing attack that's tricking recipients into granting ongoing access to their email accounts. Most recently seen on May 3 in the form of a fake Google Doc app,
the new credential phishing technique bypasses all the typical red flags like spoofed links, sign-in requests, and attached files that ordinarily warn
users to be cautious. Instead, it sends users an Open Authentication permission request for a trusted and authorized application. Worse yet, changing
passwords isn't enough to block the attack or kick out the attacker.
|When is a Ransom Not a Ransom?|
|Anne Bisagno—Monday, June 26, 2017
When you pay it and still don't get back what was stolen, which is happening more often with ransomware, at least according to a new survey of IT pros
working in small and midsize businesses.
|Hackers Follow the Money|
|Anne Bisagno—Monday, June 19, 2017
It should come as absolutely no surprise that financial services firms are the favorite targets of industry-specific attempts to breach data security. Why? Simple: that's where the money is.
|Ransomware Hits Business and Professional Services Hardest|
|Anne Bisagno—Monday, June 12, 2017
|It's More Easy Being Green|
|Anne Bisagno—Monday, June 05, 2017
Technology is notoriously resource-intensive and energy-gobbling, but it doesn't have to be. Take a look at these office-ready, eco-friendly gadgets: a
speedy solar USB charger,
a AA battery with USB port,
or a recyclable wireless keyboard and mouse made of sustainable bamboo.
|Internet Privacy: Should Your Business Worry?|
|Anne Bisagno—Tuesday, May 30, 2017
Last year, the Federal Communications Commission (FCC) pushed through new privacy regulations for home Internet and broadband providers that were designed
to require consumers to opt in before providers could sell or share their browsing history, app usage, and other private information with advertisers
and other companies. These new rules were well-intentioned, but they conflicted with the existing privacy framework put forth by the Federal Trade
Commission (FTC). As a result, the FCC and FTC will need to work together to ensure consistent, comprehensive privacy practices — at least until
Congress decides whether or not it wants to overhaul the Telecommunications Act completely.
|Get Your Board On Board With Cybersecurity|
|Anne Bisagno—Monday, May 22, 2017
If you're frustrated by how little your board of directors seems to understand about cybersecurity, take heart: you're not alone.
Recent research by security firm Focal Point Data Risk shows that security pros see their job as guiding the business and preventing loss, while business
leaders think of security primarily as a way to protect company data and the corporate brand.
|Patch Your Windows Systems in March? If so, you are Safe From “WannaCry” Ransomware Attack|
|Anne Bisagno—Tuesday, May 16, 2017
The so-called Wanna Decyptor ransomware is currently moving across 74 countries in more than 45,000 attacks, including a massive takedown of several UK