News

Submit
Preparing for the Worst Case Scenario

Preparing for the Worst Case Scenario

In this edition of the Watch Out Wednesdays newsletter, we’ll shift our attention from the cyber criminals who are clearly out to get us, to natural forces that only seem that way.   With Harvey’s devastating effects certain to be felt for years to come, and Irma bearing down on South

Another Cybersecurity Myth That Puts You At Risk

Another Cybersecurity Myth That Puts You At Risk

Conventional wisdom that makes you vulnerable. Merriam-Webster defines conventional wisdom as “the generally accepted belief, opinion, judgment, or prediction about a particular matter.” When it comes to cybersecurity, conventional wisdom has settled on a set of beliefs which, taken together,

Giving Your Coworkers a Clue About Cybersecurity

Giving Your Coworkers a Clue About Cybersecurity

Everyone in IT knows that end users are the weakest link in a company’s cybersecurity defenses. But how oblivious to security are your own end users? We think it’s time you found out, and we’re giving you a tool to do just that. The Pew Research Center is one of the most well-respected

Security Myths That Make You Vulnerable

Security Myths That Make You Vulnerable

We've said it before: The biggest threat to your cybersecurity is the cybersecurity industry.  By relentlessly pushing product-based solutions ("Just buy this, and your troubles are behind you!"), and oversimplifying the complexities of the real world ("Just do this, and you'll be secure!"),

Don't Take The Bait

Don't Take The Bait

Phishing Season Is Still Open   Organizations hit with malware during the second quarter of 2017 had it delivered via phishing attacks in 67% of the cases, according to a Global Threat Intelligence Center (GTIC) report released today by NTT Security.  That’s a lot of people clicking on

80% of Hacks Happen the Old-Fashioned Way

80% of Hacks Happen the Old-Fashioned Way

Let's Play Password We’ve beat the drum about password policies so insistently that we’re reluctant to become a pest about it. But every time we move on, another study drags us back. According to the 2017 Verizon Data Breach Report, four out of five successful network attacks take place

Surprise:  Good News on the Cybersecurity Front

Surprise: Good News on the Cybersecurity Front

The annual Ponemon Cost of Data Breach Study always brings a few surprises, and this year was no exception. The biggest surprise was that some of the news was actually good. For the first time since the global study was first instituted, the average cost of a data breach actually declined

Data Breaches Hit Mid-Year High

Data Breaches Hit Mid-Year High

  The number of US data breaches hit a half-year record high in 2017, according to a report released by the Identity Theft Resource Center (ITRC).  The poll results show a significant jump of 29 percent over the first half of 2016.    In a technology landscape where breach activity

The Seven Stages of Cybersecurity Grief

The Seven Stages of Cybersecurity Grief

Which stage is your company in?  As far back as 1969, psychologists had identified a series of stages that grief-stricken patients pass through, from Denial to Acceptance, when confronted and forced to deal with an unforeseen tragedy. The same model can be applied to companies grappling with

The Greatest Threat to Cybersecurity

The Greatest Threat to Cybersecurity

The Greatest Threat to Cybersecurity is . . .                          . . . the Cybersecurity Industry It's true. Having analyzed hundreds of data breaches -- and the corporate mindsets that preceded them -- no other conclusion is possible. In a frantic scramble to stake their claims to