News

Submit
Is your stuff enough?

Is your stuff enough?

Think about the technology landscape as it existed at the turn of the century. Having just survived the run up to Y2K, most IT departments were well staffed and adequately funded (for the last time, it seems). All network assets were local, and all servers physical. If you had 500 employees, the

Post-Irma: How did your business fare through the storm?

Post-Irma: How did your business fare through the storm?

With Hurricane Irma in the rearview, first responders are on the roads cleaning debris and restoring power.  Employees are taking down their shutters and slowly returning to work (either remotely or at those offices fortunate enough to suffer little impact from the storm). Business owners are

Preparing for the Worst Case Scenario

Preparing for the Worst Case Scenario

In this edition of the Watch Out Wednesdays newsletter, we’ll shift our attention from the cyber criminals who are clearly out to get us, to natural forces that only seem that way.   With Harvey’s devastating effects certain to be felt for years to come, and Irma bearing down on South

Another Cybersecurity Myth That Puts You At Risk

Another Cybersecurity Myth That Puts You At Risk

Conventional wisdom that makes you vulnerable. Merriam-Webster defines conventional wisdom as “the generally accepted belief, opinion, judgment, or prediction about a particular matter.” When it comes to cybersecurity, conventional wisdom has settled on a set of beliefs which, taken together,

Giving Your Coworkers a Clue About Cybersecurity

Giving Your Coworkers a Clue About Cybersecurity

Everyone in IT knows that end users are the weakest link in a company’s cybersecurity defenses. But how oblivious to security are your own end users? We think it’s time you found out, and we’re giving you a tool to do just that. The Pew Research Center is one of the most well-respected

Security Myths That Make You Vulnerable

Security Myths That Make You Vulnerable

We've said it before: The biggest threat to your cybersecurity is the cybersecurity industry.  By relentlessly pushing product-based solutions ("Just buy this, and your troubles are behind you!"), and oversimplifying the complexities of the real world ("Just do this, and you'll be secure!"),

Don't Take The Bait

Don't Take The Bait

Phishing Season Is Still Open   Organizations hit with malware during the second quarter of 2017 had it delivered via phishing attacks in 67% of the cases, according to a Global Threat Intelligence Center (GTIC) report released today by NTT Security.  That’s a lot of people clicking on

80% of Hacks Happen the Old-Fashioned Way

80% of Hacks Happen the Old-Fashioned Way

Let's Play Password We’ve beat the drum about password policies so insistently that we’re reluctant to become a pest about it. But every time we move on, another study drags us back. According to the 2017 Verizon Data Breach Report, four out of five successful network attacks take place

Surprise:  Good News on the Cybersecurity Front

Surprise: Good News on the Cybersecurity Front

The annual Ponemon Cost of Data Breach Study always brings a few surprises, and this year was no exception. The biggest surprise was that some of the news was actually good. For the first time since the global study was first instituted, the average cost of a data breach actually declined

Data Breaches Hit Mid-Year High

Data Breaches Hit Mid-Year High

  The number of US data breaches hit a half-year record high in 2017, according to a report released by the Identity Theft Resource Center (ITRC).  The poll results show a significant jump of 29 percent over the first half of 2016.    In a technology landscape where breach activity