2021 Cybersecurity Predictions

2020 has made cybersecurity among the priorities of most organizations. The challenging times brought by the COVID pandemic showed that no corporation is immune to cyber attacks. Even the largest and seemingly secure companies suffered vulnerabilities … Continue reading 2021 Cybersecurity Predictions

Remote Workers Don’t Have to Be Insecure Workers

These are unprecedented times. As countries around the world struggle to contain and respond to the COVID-19 pandemic, businesses of all sizes and across all industries find themselves suddenly trying to maintain business continuity with an entirely re… Continue reading Remote Workers Don’t Have to Be Insecure Workers

An Unexpected Insider Threat: Senior Executives Who Ignore Cybersecurity Rules

Cybersecurity should be a top concern for any business, with strong policies and protocol put in place, and top executives leading by example. However, recent research has shown that more than half of senior managers disregard the rules, placing their … Continue reading An Unexpected Insider Threat: Senior Executives Who Ignore Cybersecurity Rules

Security First: The Double-Edged Sword of Remote Collaboration

For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true phishing scam today r… Continue reading Security First: The Double-Edged Sword of Remote Collaboration

A No-Compromise Approach to Your Cloud-Based Intranet Security

It’s a well-established fact that companies prefer cloud solutions to on-premises ones when it comes to practically any software. It’s estimated that over 80% of all enterprise workloads will be in the cloud by 2020. But what about an intra… Continue reading A No-Compromise Approach to Your Cloud-Based Intranet Security

WhatsApp Vulnerability Illustrates Importance of Data Protection

Technology provides a wide variety of benefits, but many come with caveats or pitfalls as well. When it comes to communication, technology enables us to engage with just about anyone, anywhere in the world, at any point in time—but the same techn… Continue reading WhatsApp Vulnerability Illustrates Importance of Data Protection

Insider Threats: How Can Enterprises Better Protect against this Growing Danger?

According to research from CA Technologies, over half of cybersecurity professionals, or 53 percent, have confirmed an insider attack against their own organization in the past 12 months. These insider threats have had disastrous, sometimes even tragic… Continue reading Insider Threats: How Can Enterprises Better Protect against this Growing Danger?

Your Supply Chain May Be a Trojan Horse

No organization exists in vacuum. There is no such thing as a completely self-sustaining company that does not in some way depend on suppliers, partners, and service providers. Businesses use products and services from other companies to manage and gro… Continue reading Your Supply Chain May Be a Trojan Horse

Insider Threats: Keeping the Cyber Boogeyman Out

There’s a reason why National Cybersecurity Awareness Month coincides with the Halloween season. After all, what’s scarier than a cybercriminal making his way into an organization? Well for starters, how about the employee that may unknowin… Continue reading Insider Threats: Keeping the Cyber Boogeyman Out