Why Small Businesses Need Enterprise-Grade Security Just As Much As Large Corporations

In 2017, Verizon’s Data Breach Investigation Report revealed 61 percent of all cyberattacks target small businesses. And according to the U.S. Cyber Security Alliance, 60 percent of small business that suffer a cyberattack go out of business within six months. Bad actors are using phishing and ransomware attacks to steal information to empty bank accounts via wire transfers, […]

The four myths hampering cybersecurity maturity

We’ve seen tremendous advances in technology over the last 15 years or so, but security continues to struggle as much today as it did a decade ago. According to Scott M. Kannry, CEO at Axio, a large part of the problem is that security professionals and their leaders have bought into myths that hamper their […]

Scanned IDs of 119,000 FedEx customers exposed online

An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech security researchers earlier this month. The stored data had been stockpiled by Bongo International, a company that specialized in helping North American retailers and brands sell online to consumers […]

General Data Protection Regulation (GDPR) requirements, deadlines and facts

Companies that collect data on citizens in European Union (EU) countries will need to comply with strict new rules around protecting customer data by May 25. The General Data Protection Regulation (GDPR) is expected to set a new standard for consumer rights regarding their data, but companies will be challenged as they put systems and processes in […]

Cloud sync vs backup: Which disaster recovery works better for business continuity?

Backup is the traditional way most businesses protect their digital assets from disaster. At regular intervals, changes in local storage are transferred to either a local backup device or a cloud backup service. Usually, these changes are incremental and go into backup archives. A good backup service will store ongoing snapshots, so it’s always possible […]

3 Tips to Keep Cybersecurity Front & Center

For IT departments — especially in large organizations — daily operations are complex, multifaceted, and often overwhelming. With so many different demands requiring attention, cybersecurity easily gets lost in the shuffle, particularly when it’s perceived to create more work or extra steps. But in today’s risk environment, keeping cybersecurity front and center is not a […]

The GDPR Clock Is Running Out. Now What?

On May 25, the European Union’s General Data Protection Regulation (GDPR) goes into effect. The transformative new law is expected to have a profound impact on how businesses the world over collect, manage, and defend their data. But while companies have had more than two years to prepare for the ground-breaking legislation – passed in […]

Online security 101: Tips for protecting your privacy from hackers and spies

Got nothing to hide? Think again. Privacy is what sets us apart from the animals. It’s also what sets many countries and citizens apart from dictatorships and despots. People often don’t think about their rights until they need them — whether it’s when they’re arrested at a protest or pulled over for a routine traffic stop. […]

VPN services 2018: The ultimate guide to protecting your data on the internet

You’ve heard the advice before: Whether you’re in the office or on the road, a VPN is one of the best ways to protect yourself on the internet. But how effective are VPNs? What’s the best one for you? What are the downsides? A new ZDNet executive guide aims to answer all your VPN-related questions […]

Better Security Analytics? Clean Up the Data First!

Our industry is losing the cybersecurity war. Not a week goes by in which we don’t hear about a new data breach. Overwhelmed security operations center (SOC) personnel, who already were in short supply, are leaving the profession because of sheer exhaustion. The rapid rate of change brought on by DevOps and cloud computing has […]