Cyber-Security

Home » Cyber-Security

Bridging the Cybersecurity Skills Gap Safeguards Critical Assets

By |2021-04-12T15:28:12-04:00April 12th, 2021|Cyber-Security|

In 2019, major news outlets reported the prediction that 3.5 million cybersecurity jobs would be left unfilled by 2021. And then the pandemic hit, throwing another wrench in the rapidly evolving threat landscape. To protect vital data assets, companies need to act quickly and decisively to address the cybersecurity skills gap within their organizations. As 2021 moves into the second quarter, we see that prediction being fulfilled. While the skills gap brings career opportunities for trained security professionals, it spells danger for organizations across the globe. Without effective cybersecurity, companies put critical data and processes at risk. Contributing Factors that

Comments Off on Bridging the Cybersecurity Skills Gap Safeguards Critical Assets

State-backed Cyber Attacks Pose Dangerous Threat to Business

By |2021-04-13T11:22:40-04:00March 31st, 2021|Cyber-Security, Safety and Cyber Security|

In late 2020, a study showed that 80 percent of businesses worried about state-backed cyber attacks. Within weeks, the Russian-sponsored SolarWinds hack and the China-backed Microsoft Exchange hack came to light, confirming those concerns. Should businesses and individuals fear these attacks, or do they only affect government agencies? Lawless Frontier Invites Multiple Players In recent years, countries have increasingly turned to the cyber arena to conduct espionage and warfare. Unlike traditional warfare, very few international laws exist to govern cyber warfare. And, while Russia and China currently dominate the stage, smaller countries can also make a big impact with a

Comments Off on State-backed Cyber Attacks Pose Dangerous Threat to Business

7 Work from Home Security Tips to Include in Your Cybersecurity Checkup

By |2021-03-24T19:26:21-04:00March 24th, 2021|Cyber-Security|

  A full year after the pandemic began, studies suggest that remote work is here to stay. Over 40 percent of employees work remotely and plan to continue to do so indefinitely. With that in mind, organizations should take the pandemic anniversary as a time to conduct a cybersecurity checkup. Be sure to include these work from home security tips in the strategy moving forward. 1. Ensure Endpoint Security With an increasingly mobile workforce, the network perimeter has all but disappeared. Each laptop, tablet and smartphone that connects to the network adds another possible entryway for cyber criminals. Consequently, organizations

Comments Off on 7 Work from Home Security Tips to Include in Your Cybersecurity Checkup

Medical Identity Theft – When Your Health Is Their Wealth

By |2020-10-06T05:48:00-04:00August 9th, 2020|Cyber-Security|

Cybercriminals are giving a new meaning to the term ‘Health is Wealth’. Medical identity theft has victimized over 2.2 million people and that number is growing. Although medical identity theft is not something new, the increasing number of data breaches has increased the number of victims. What is Medical Identity Theft? Medical identity theft occurs when someone steals your personal information to get free medical care, medical devices or prescription drugs under your name. This is more dangerous than identity theft because medical identity theft not only ruins your finances, it can have terrible effects on your health. The information

Comments Off on Medical Identity Theft – When Your Health Is Their Wealth

4 signs your healthcare organization is due for a network upgrade

By |2020-10-06T06:33:13-04:00August 9th, 2020|Cyber-Security|

Your competitors are ready to invest in modern IT infrastructure, so now is the right time to start lobbying your higher-ups for a network upgrade. The proof? According to Damon Consulting’s third annual Healthcare IT Demand Survey, infrastructure upgrades have ranked with AI and big data analytics as top spending priorities in recent years. So what does this mean for IT leaders? It translates to a strong business case for any network upgrade you might have on your own wishlist. If you’re still not convinced, here are four signs that you need to catch up with digitizing healthcare and leave behind

Comments Off on 4 signs your healthcare organization is due for a network upgrade

7 Coronavirus related scams targeting your business

By |2020-06-11T13:37:38-04:00May 11th, 2020|Cyber-Security, Safety and Cyber Security|

We’ve warned consumers about Coronavirus related scams, but businesses are at risk, too. Keep your guard up against these seven B2B scams that try to exploit companies’ concerns about COVID-19. In addition to sharing this information with your employees and social networks, read on for how you can report Coronavirus scams to the FTC. Coronavirus related scams: "Public Health" Scams Fraudsters are sending messages that claim to be from the Centers for Disease Control and Prevention (CDC), World Health Organization (WHO), or other public health offices. They may ask for Social Security numbers, tax IDs, etc. Other variations direct you to

Comments Off on 7 Coronavirus related scams targeting your business

5 File Sharing Best Practices to Protect Business Data at Home

By |2020-06-11T13:45:38-04:00April 29th, 2020|Cyber-Security, Data Compliance|

After several weeks of lockdown with its necessary work-from-home (WFH) conditions, we’ve all adapted fairly well to the WFH basics. We can access our company network and apps, post to the blog and gratefully check the status of our paychecks. Perhaps now is the time to check and improve the security of our business data by implementing some file sharing best practices. 1. Establish a Security-first Mindset With COVID-19 WFH policies, end users regularly conduct business via home computer, laptop or mobile device. As a result, the network perimeter has largely disappeared. Thus, an organization’s WFH security posture would be

Comments Off on 5 File Sharing Best Practices to Protect Business Data at Home

COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00-04:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

4 Data Governance Tools that Protect and Power Vital Information Assets

By |2020-06-12T10:30:08-04:00April 1st, 2020|Cyber-Security, Data Compliance, Information Governance and Management|

Along with daffodils and Mardi Gras, spring 2020 brought a pandemic that has rocked the global economy and changed daily life. As organizations navigate the crisis, they depend on accurate, accessible and usable data to forecast the future and inform decisions. Data governance tools play an essential role in ensuring that businesses realize the full potential of data. For example, retail businesses need to respond in an agile way to changes in consumer buying habits. With up-to-date data, they can quickly analyze, and even anticipate, those changes. And with more employees working remotely, data governance tools help ensure that the

Comments Off on 4 Data Governance Tools that Protect and Power Vital Information Assets

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00-04:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers
Go to Top