News

Submit
The Threat Landscape is Evolving... And So Should You.

The Threat Landscape is Evolving... And So Should You.

We often talk about the evolution of data breaches and the increased sophistication in the methods used by cyber criminals to launch attacks.  As security breaches become more disruptive and damaging, many organizations are using data encryption to protect their internet traffic. Unfortunately,

It's a day for love...and scams.

It's a day for love...and scams.

Today is Valentine’s Day, and love is in the air!  Unfortunately hackers are also wise to that fact.  And they know there are many individuals feeling particularly lonely today, so they have unleashed  zombie bots in the hope of taking advantage of those looking for love online. IBM X-Force, a

The NEW PCI Compliance

The NEW PCI Compliance

Remember that massive data breach Target fell victim to in 2013 that compromised more than 40 million of the company’s credit card account holders prompted and 18.5 million multi-state settlement last year?  You can’t blame Target’s own security platform for that doozy.  Hackers went elsewhere to

How to Create a Cybersecurity Culture

How to Create a Cybersecurity Culture

Despite constant headlines about cyber attacks, organizations continue to take hefty risks by leaving their systems and data unnecessarily vulnerable. According to Kaspersky Labs and the Ponemon Institute, 90% of businesses have experienced a cyber attack, with an average cost per breach of 3.6

The High Cost of Downtime

The High Cost of Downtime

Even with resilient infrastructures and state-of-the-art technologies, businesses today still face downtime and data loss. Although most enterprises aim for a 99.99% (four nines) uptime standard, downtime should be anticipated, and every business should have a continuity and recovery plan in

HIPAA compliance is only getting tougher.

HIPAA compliance is only getting tougher.

While all industries fell victim to data breaches in 2017, the Healthcare sector continued to be one of the most targeted.  With regulatory requirements to live up to, healthcare executives must be consistently on the ball, making adjustments to their cybersecurity plans to ensure they don’t run

Inactive Accounts: A Hacker's Easy Way In

Inactive Accounts: A Hacker's Easy Way In

If you’re a frequent reader of our blog, then you know our most repeated mantra: It’s not if a cyber attack will happen; it’s simply a matter of when.  All of those large data breaches we continue to see in the headlines share one common denominator: compromised privileged accounts. And one of the

What We Can Expect in 2018

What We Can Expect in 2018

In 2017, the hits just kept on coming!  With a continued upward trend of some of the largest data breaches on record, this likely (and unfortunately) represents a new normal.  As you would expect, 2018 is shaping up to be another landmark year of cybersecurity trends.  These are just a few we are

2017 Data Breaches: Here's What We Learned

2017 Data Breaches: Here's What We Learned

Another year has passed and along with it another set of massive data breaches to look back upon.  In a digital age when we are providing more and more personal data to businesses and conducting most of our financial transactions online, we would expect companies to keep up with the threat

The SLPowers Speakers Series

The SLPowers Speakers Series

Whether we’re educating technology professionals on the latest trends in cybersecurity or translating industry jargon into plain English for executives and other non-technical audiences, the SLPowers Speakers Series represents a “Sales Free Zone.”   Our mission is to advance the