|The 3 Cs of Cybersecurity|
|Anne Bisagno—Monday, March 20, 2017
If you hope to get your non-technical employees actively engaged in helping the company fend off cyber threats, you can't talk to them in technical terms.
Lance Spitzner, a board member of the National Cyber Security Alliance, suggests framing the issue with these three Cs:
|Cloud Security is Business-Ready. Are You?|
|Anne Bisagno—Monday, March 13, 2017
If you've been avoiding moving critical applications and data to the cloud out of concerns about security, it's time to reconsider. The question isn't
whether leading cloud providers' resources are secure. They are. They've invested heavily to make sure of it, and they've built an ecosystem of tech
partners with solutions that are equally secure. The real question is whether your company knows how to prepare to implement cloud services and ensure they work properly and securely.
|Three Ways to Prepare for a Data Breach|
|Anne Bisagno—Monday, March 06, 2017
The better your response to a cyber attack, the more limited its impact. In fact, the Ponemon Institute says strong incident response (IR) saves an average
of $400,000 in damages per data breach. But how do you ensure your IR is strong? By taking these three proactive steps before a breach happens:
|Skills Gap = Security Gap|
|Anne Bisagno—Monday, February 27, 2017
Roughly 1 million cybersecurity jobs worldwide are unfilled. The people already in the field are scrambling to keep up with the constantly changing tools
and know-how they need to fend off attackers. No wonder 70% of organizations surveyed by the Information Systems Security Association (ISSA) and analyst
firm Enterprise Strategy Group (ESC) say the cybersecurity skills gap is causing them problems,
and 54% say they've experienced at least one breach in the last year.
|Training your Employees to Recognize Phishing Emails Works|
|Anne Bisagno—Tuesday, February 21, 2017
When anti-phishing security company PhishMe tested about 1,000 of its customers worldwide by sending them more than 40 million simulated phishing emails
over the course of 18 months, it concluded that phishing causes the vast majority of cyberattacks —
an estimated 91% of them. It also found the most effective phishing emails come from Locky ransomware, most likely because they look like personalized
invoices and lack the grammar and spelling mistakes common among other malware.
|What’s the Best Way to Fend off Ransomware Attacks?|
|Anne Bisagno—Friday, February 17, 2017
Since ransomware attacks are more prevalent than ever according to a recent Forbes article,
we’ve put together some best practices that
will help you fight back. Hopefully our articles will reassure you that the fight isn’t a losing battle.
|Cybersecurity is National Security|
|Anne Bisagno—Monday, January 09, 2017
As cyber threats become more frequent and dangerous, the US Presidential Commission on Enhancing National Cybersecurity has released a report recommending
that the public and private sectors work together to protect critical infrastructure in six key areas:
|New Guidelines for Small Business Cybersecurity|
|Anne Bisagno—Tuesday, January 03, 2017
Small business owners who aren't sure where to start securing their data and applications can now download a guide designed to help them jumpstart the
process. Created by the National Institute of Standards and Technology in collaboration with the Small Business Administration, Small Business Information Security: The Fundamentals outlines six basic steps:
|Which Tablet Will Make the Perfect Gift?|
|Anne Bisagno—Thursday, December 22, 2016
With the holidays just around the corner and a new tablet at the top of many wish lists, the following is some information that will help you figure out
which tablet will make the perfect gift.
|The Battle for IoT Security|
|Anne Bisagno—Monday, December 19, 2016
Leading security experts begged the US House Committee on Energy and Commerce in November to establish federal regulations, and even a new federal agency,
devoted to securing the Internet of Things.
They argued that: