In the era of work from home, cloud computing, mobile devices and IoT, the network security perimeter is gradually disintegrating, and internal and external threats are intensifying, leading to the failure of the traditional perimeter-based
Email Attacks are Still the Primary Security Attack Vector 70% of attacks on businesses are from external parties with a financially motivated goal (86% of the time). Social and malware attacks combined account for 39%
Increased Security Risks with Remote Workers in the “New Normal” The need to have so many employees work from home creates new security risks. These risks used to be easy to ignore when most of
MFA (Multi-factor Auth) Solves the Biggest Work-from-Home Issue – Security Criminals rely on log-in credential stealing as their #1 method to gain access to your systems, data and applications. MFA (multi-factor authentication) makes
2020 Cybersecurity Solutions Needed in a Post-Coronavirus (COVID-19) World Companies in the new post-coronavirus world order must now quickly double down on secure mobile workforce enabling solutions. 2020 security changes are being driven by: 1)
2020 Top 9 Most Ignored Security Controls Security blind spots can cause companies to ignore needed security controls. Blind spots can be caused by not adapting to a changing environment, focusing too much on old
How much money have you spent on cloud application security? Zero? Almost zero? Everything is moving to the cloud. Can companies continue to ignore the fact that when your applications move to the cloud, your
Cyber Security Trends 2020 2020’s security threats will be driven by new technology and new attack methods that leverage that new technology. Drivers of new attacks include more servers, applications and data in the cloud, more
Why Prevent, Detect & Respond? The security world is looking beyond security prevention alone to prevent, detect and respond solutions. No company can prevent all security breaches, so informed companies are implementing strategies that
Managed Detection & Response Delivers Detect and Respond is the New Security Focus Managed Detection and Response (MDR) is the latest evolution in managed security services. It’s goal is to deliver on the need
What is in a SIEM We hear all kinds of stories from customers regarding security monitoring. There is a ton of confusion about what SIEM (Security Information and Event Monitoring) systems are expected to
Managed Security Services Managed security service providers are increasingly providing integrated security solutions that are designed to address an increasing threat landscape. By using new solutions that support monitoring, detection and response, these managed
Cloud Security: Are you Ready? Companies are moving toward Cloud Computing The public cloud computing market (mostly Amazon AWS and Microsoft Azure) is growing rapidly at around 25% per year. However, many obstacles exist
The Need for 3rd Party Risk Management Increasing Most companies are overwhelmed with the task of trying to provide adequate security for their own company. But the requirement for you to secure your company
2019 Security Regulation Changes – Fast and Furious In the last year, we have seen a move toward security regulation changes mandating protection of consumer personal data (broadly speaking) extending beyond “private data” to all
The need for Internet of Things security (IoT security) and IoT security standards has never been higher. IoT threats and attacks are on the rise increasing by 600% in 2017. Recent IoT based DDoS attacks
The Evolution & Future of Cyber Security In Part 1 of the 2019 planning series, we discussed the evolution of technology and how that has driven cyber attacks. Now we will look at the future of
IT technology has been driving cyber security attack trends and cyber security defenses since the 80s. The attack surface has widened every time a major new technology has been deployed. Technology Evolution In the
Software supply chain attacks may be replacing zero-day attacks as a method to evade your security. Zero-day attacks are still on the rise, but what if there was a better way to get malware into
On June 28, 2018 the most sweeping personal privacy law (AB-375) was passed in California (the California Consumer Privacy Act of 2018) also known as CCPA. A GDPR-like bill, effective January 1, 2020, the law
More than 50% of cyber security breaches involve stolen login credentials, it is the #1 method used. If you asked 100 IT professionals if passwords are enough to keep your company secure probably all of
We are in the midst of a car wreck in terms of security attacks and many companies are treating their wounds with band-aids. Without a cohesive cyber security strategy to address the changing cyber
It’s coming. The technology is proven. The same AI cyber security technology that can be deployed to protect against the latest cyber security attacks is starting to be used to find your latest weaknesses and to
Here is quick summary of the EU GDPR as it applies to U.S. companies. This article defines what it is, who it effects and how to respond to it for U.S. companies trying to cope
What is the EU GDPR Privacy Regulation? The EU GDPR, is a regulation that lays down rules relating to the protection of EU Personally Identifiable Information (PII) and covers the processing of personal data and
WordPress now powers 30% of all websites with a 60% share of content management systems, up from 23% in 2015. Websites are routinely attacked to infect website visitors as well to attack the companies that
Cyber Criminals are not standing still and 2018 is rolling. What are you doing to move the ball forward in response to 2018 cyber security trends and the resulting threats? 2018 cyber security threats require an appropriate response on how
Your website is now the most important component of your marketing strategy. But are you leveraging website security to make your website more credible and trustworthy? HTTPS Everywhere and proper content development can make a
SIEMs Need to Be Added to Every Serious Companies Security? Due to increasing cyber security regulations and pressure by business partners, an increasing number of companies need to add a SIEM (Security Information and Event
Deadline for NIST 800-171 Compliance is December 31st, 2017 The federal government is mandating that their partners all be compliant with NIST 800 which was originally designed for larger federal agencies. While NIST 800-171 addresses
Experts now claim that Next Generation Endpoint Protection is required to provide advanced malware protection and that traditional antivirus endpoint security does not work. Advanced malware like Ransomware that attack your endpoints (threats to PCs, servers and
CEO Fraud is defined as scam in which cybercriminals spoof company email accounts and impersonate executives using spear phishing to try and fool someone in your company (an employee in accounting, finance or HR) into executing
You moved your email and documents to the Office 365 cloud and you assume Office 365 security is actually secure. Out of sight, out of mind, right? Microsoft wouldn’t sell anything that was not secure, right? Secure
SIEM (Security Information and Event Monitoring) systems are a hot topic in security. More and more companies are being driven to achieve a new higher level of cybersecurity and are adopting an SIEM as a core
This is the first installment of a new quarterly cybersecurity news blog on what’s going on in cybersecurity on topics that you might actually care about that can help your business. Here are some short
Social type cyber security attacks were utilized in 43% of breaches in 2016. That includes, malicious emails, social Website links, and other types of attacks that lure employees to provide private data (like passwords) for
What is WannaCry? WannaCry is an insanely fast-spreading ransomware malware worm that leverages a Windows exploit to remotely target unpatched or unprotected Windows computers. Because WannaCry is the first ransomware worm, it can spread
Are you making enough progress on your cybersecurity? Customers we talk to want to enhance their cybersecurity, but don’t have the time, resources or money. They are constantly battling to keep up with latest threats,
I hate to get on a soap box, but most businesses are behaving as though the increased use of office cloud applications like O365, Google Docs, Box, CRM, accounting, and marketing has no effect on
Not upgrading your security with the latest 2017 security trends can leave you as naked and unprotected as the dinosaurs. Security solutions are moving forward rapidly to protect against the latest threats, and to enable
The security threatscape continues to change rapidly and so have the top security threats for 2017. Ransomware has impacted everyone we know. Our employees are proving to be our weakest security link. Data breaches are
Cybersecurity Risk assessments are essential activities performed on your company’s security infrastructure that reveal threats to key corporate assets and vulnerabilities in your current security controls. The ultimate goal of a risk assessment is to
American companies and individuals paid $325 million in ransomware in 2015 and attacks are on the rise. Ransomware has been detected on 753,684 U.S. computers and is one of the biggest threats to businesses of
Cybersecurity Risk assessments are essential activities performed on your company’s security infrastructure that reveal threats to key corporate assets and vulnerabilities in your current security controls. The ultimate goal of a risk assessment is to
BC, DR, HA, Pick Your Acronym Business Continuity, Disaster Recovery, High Availability, system uptime… These are all terms that describe one of the most important needs of almost any business. Keeping your company running is one
When it comes to your employee’s, most businesses have blind faith in their employee’s ability to screen security threats and steer clear of online danger. Studies show, though, that employees who do not have cyber
Many companies need to ramp up your security toward the ultimate goal of strong compliance level security. This is a natural progression of security as companies grow or become more concerned about their data, system
Companies that get complete 3rd party security reviews develop balanced security strategies. Lack of security visibility can result in security vulnerabilities and can lead to a very imbalanced security infrastructure with over or under budget
Most companies are unregulated and so they often think that the requirements for high levels of security don’t apply to them. But regulations are only one reason that companies need to adopt strong security (compliance
Is Security Compliance Cost Out of Your Reach? Over the years, assessing security levels and demonstrating security compliance hasn’t been a core focus for many small to mid-size service companies’. Yes, information security has always