How costly is an insider threat?

Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent $15.4 million annually on overall insider threat remediation and took 85 day… Continue reading How costly is an insider threat?

Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices

69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside the corporate network, a SentryBay survey reveals. The poll aimed to assess at… Continue reading Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices

Companies ditching VPNs for zero trust architectures to secure hybrid workplaces

Hybrid workplaces are the new norm, with 99% of respondents’ reporting their workforces will split time between the office and remote settings post-pandemic, a Teradici survey of more than 8,000 respondents across a range of industries reveals. The sur… Continue reading Companies ditching VPNs for zero trust architectures to secure hybrid workplaces

Designing a BYOD Approach for the Future

  Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto Networks by ONR found 60% of companies expanded their BYOD policies to help employees manage the shift to remote work at the beginning of the pandemic. However, the convenience that the new BYOD […]

The post Designing a BYOD Approach for the Future appeared first on Security Intelligence.

Continue reading Designing a BYOD Approach for the Future

A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world

The pandemic has had a significant impact on the way we work, and one of our recent research studies found that nearly 65% of companies expect some or all their workforce to remain remote indefinitely. Unfortunately, last year’s sudden transition has c… Continue reading A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world

Where Digital Meets Human: Letting HR Lead Cybersecurity Training

One of my favorite questions to ask when I’m interviewing a business decision-maker is if they are confident in their company’s current defenses. Most people tell me yes. So, I was surprised to read that an IDG Research Services survey commissioned by Insight Enterprises found that 78% of respondents reported that they do not think […]

The post Where Digital Meets Human: Letting HR Lead Cybersecurity Training appeared first on Security Intelligence.

Continue reading Where Digital Meets Human: Letting HR Lead Cybersecurity Training

Zero trust network access: A safe journey to a better employee experience

Trust is a foundational element of society. When engaging in any social or commercial interaction, we need to be able to trust the people we deal with. And yet, one of today’s most intensely discussed IT security concepts is zero trust network ar… Continue reading Zero trust network access: A safe journey to a better employee experience

IoT malware attacks rose 700% during the pandemic

Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The report analyzed over 575 million device transactions and 300,000 IoT-specific … Continue reading IoT malware attacks rose 700% during the pandemic

Ignorance is Bliss… for Hackers

Imagine standing in front of the CEO and company board of directors, asking them for a check for an obscene amount of money to pay off hackers that are holding critical data hostage and disrupting the company business. 
I am sure many of you are cring… Continue reading Ignorance is Bliss… for Hackers