Submit

Cybersecurity

Giving Your Coworkers a Clue About Cybersecurity

Giving Your Coworkers a Clue About Cybersecurity

Everyone in IT knows that end users are the weakest link in a company’s cybersecurity defenses. But how oblivious to security are your own end users? We think it’s time you found out, and we’re giving you a tool to do just that. The Pew Research Center is one of the most well-respected

Security Myths That Make You Vulnerable

Security Myths That Make You Vulnerable

We've said it before: The biggest threat to your cybersecurity is the cybersecurity industry.  By relentlessly pushing product-based solutions ("Just buy this, and your troubles are behind you!"), and oversimplifying the complexities of the real world ("Just do this, and you'll be secure!"),

The Seven Stages of Cybersecurity Grief

The Seven Stages of Cybersecurity Grief

Which stage is your company in?  As far back as 1969, psychologists had identified a series of stages that grief-stricken patients pass through, from Denial to Acceptance, when confronted and forced to deal with an unforeseen tragedy. The same model can be applied to companies grappling with

The Greatest Threat to Cybersecurity

The Greatest Threat to Cybersecurity

The Greatest Threat to Cybersecurity is . . .                          . . . the Cybersecurity Industry It's true. Having analyzed hundreds of data breaches -- and the corporate mindsets that preceded them -- no other conclusion is possible. In a frantic scramble to stake their claims to

Who's Watching Your Stuff

Who's Watching Your Stuff

You take 86,000 here, and 86,000 there, and pretty soon you're talking real money. A recent survey revealed a single cyber-security incident now costs the average American small or medium business 86,500. For Enterprises, the number is nearly ten times larger (861,000). Kaspersky Lab asked

Two-Factor Authentication

Two-Factor Authentication

Security gurus have long recommended the use of two-factor authentication as a key method of improving the security of your organization's most critical information. But more than 40 percent of companies continue to run single-authentication environments, in which employees attain network access by

Five Cyber Crime Factoids (Reader Discretion Is Advised)

Five Cyber Crime Factoids (Reader Discretion Is Advised)

No hype needed. Here are the facts. According to a 2016 report from Small Business Trends, 43 percent of cyberattacks target small businesses. These aren't crimes of opportunity anymore. Smaller businesses usually deploy easier defenses to hack, which transform those networks into gateways to

The Big Risk Cyber Insurance Can't Cover

The Big Risk Cyber Insurance Can't Cover

It's easy to see why cyber insurance has become must-have coverage for millions of American companies.  With the threat landscape changing faster than ever, with regulatory penalties growing real teeth, with court decisions sending mixed messages, carrying robust cyber insurance is more

A Crisis is No Time for Improvisation

A Crisis is No Time for Improvisation

The hours right after a data breach are among the most chaotic any business will encounter. You don't want to spend them trying to improvise an intelligent, effective, and compliant response plan. According to the Verizon Data Breach Investigations Report, you are five times more likely to find

The Real Cost of a Data Breach

The Real Cost of a Data Breach

There is no shortage of talk about new cyber threats and their impact on the regulatory landscape, but what are their real implications? We’ve broken them down into three categories: “Penalties With Teeth” for our HIPAA readers, “Do I Feel Lucky?” for those under PCI requirements, and “Reputation,