Security Threats Are Swamping IT

Spiraling costs and a lack of skilled cybersecurity professionals are putting pressure on IT teams—and it shows When I think of IT departments and cybersecurity, I’m reminded of the fable of the little Dutch boy who put his finger in a leaking dike to… Continue reading Security Threats Are Swamping IT

Cyber Hygiene: Boosting Your Security Posture

It has been two years since Equifax announced a data breach that exposed the financial records of more than 147 million people, and the news continues to dominate the headlines. After two years of investigation and negotiations, the company finally ag… Continue reading Cyber Hygiene: Boosting Your Security Posture

Getting on Top of Enterprise Cyber Risk Management

It’s common for two people to discuss enterprise cyber risk management without sharing a common understanding of the topic. What is enterprise cyber risk management, anyway? The answer can vary within an organization, often depending on whether you be… Continue reading Getting on Top of Enterprise Cyber Risk Management

How Cybersecurity Salaries Fit Experience and Specialization

Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. Today, jobs are more specialized — with higher cybersecurity salaries to match.

The post How Cybersecurity Salaries Fit Experience and Specialization appeared first on Security Intelligence.

Continue reading How Cybersecurity Salaries Fit Experience and Specialization

MFA for Windows Login to Address the Vulnerabilities of Corporate Passwords

Easy for both administrators and employees, UserLock now offers multi-factor authentication (MFA) for Windows login alongside contextual controls, for the best balance of security, usability and cost available today. IS Decisions, a provider of access … Continue reading MFA for Windows Login to Address the Vulnerabilities of Corporate Passwords

Avoid Bad Security Buying Decisions

Organizations must take a strategic approach to their security buying decisions to ensure their budget is well-spent Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands… Continue reading Avoid Bad Security Buying Decisions

Understanding the Difference Between IT and Cyber Security

IT and cybersecurity are fundamental components of any company’s data security plans. Although used interchangeably, there are differences between how these terms are defined and what they involve. IT (information technology) security refers to p… Continue reading Understanding the Difference Between IT and Cyber Security

Which cyber security threats are most feared by UK businesses?

As organisations across the country are migrating to the cloud, what are their biggest worries when it comes to keeping their networks secure? We found out.
The post Which cyber security threats are most feared by UK businesses? appeared first on Inte… Continue reading Which cyber security threats are most feared by UK businesses?