The New Wave of Cybersecurity Awareness Training

The only constant is change. The ongoing effects of COVID-19 have taught us that change is inevitable to survive. One major area that has been affected during COVID-19 is how we interact with employees, and what we need those employees to know right n… Continue reading The New Wave of Cybersecurity Awareness Training

Why Financial Services Needs Network Transformation

All business industries have seen increasing pressure to digitize their services in recent years, particularly over the past 12 months in response to COVID-19. But few industries have felt this pressure more than the financial sector, where customers … Continue reading Why Financial Services Needs Network Transformation

Securing Health Care Transformation

The recent explosion of telemedicine and patient portals signals that the healthcare industry has begun to truly prioritize digital-first business models for patient and clinical interactions. One AmWell study found that in 2020, 80% of physicians rep… Continue reading Securing Health Care Transformation

What’s Next for Connected Devices in Health Care?

According to a Deloitte study, approximately 68% of medical devices will be either connected or connectable to a health system network by 2025. Each of those devices simultaneously represents an opportunity for health care providers to transform the d… Continue reading What’s Next for Connected Devices in Health Care?

Zero-Trust at Home: No-Exception Remote Work

The zero-trust approach has long been a popular strategy for organizations looking for airtight security in the workplace. By consistently questioning who a user is and what they want to do, we expel a potentially harmful blind trust; assumptions go o… Continue reading Zero-Trust at Home: No-Exception Remote Work

When a Ripple Becomes a Wave: Cyberattack Fallout

The exploitation of Microsoft Exchange Server made headlines earlier this year, sending security teams scrambling to patch their servers before malicious actors had a chance to compromise their system. According to Microsoft, they have attributed the … Continue reading When a Ripple Becomes a Wave: Cyberattack Fallout

Navigating Cybersecurity Gaps in Uncertain Times

If cybersecurity leaders and teams think this year will be quieter and easier than 2020, they are mistaken. The remote work trend launched by COVID-19 is morphing into a new hybrid environment that has some employees working at home full time, others … Continue reading Navigating Cybersecurity Gaps in Uncertain Times

Navigating Cybersecurity Gaps in Uncertain Times

If cybersecurity leaders and teams think this year will be quieter and easier than 2020, they are mistaken. The remote work trend launched by COVID-19 is morphing into a new hybrid environment that has some employees working at home full time, others … Continue reading Navigating Cybersecurity Gaps in Uncertain Times

3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an attacker… Continue reading 3 Keys to Defending Active Directory

Breach Clarity Weekly Data Breach Report: Week of April 19

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of April 19