A Dire Need for Proactive Cyber Security Investments: Report

Trend Micro Incorporated released its 2017 Midyear Security Roundup: The Cost of Compromise, detailing the threats from the first half of 2017, which continue to disrupt and challenge IT planning. Read about the new report called 2017 Midyear Security Roundup: The Cost of Compromise by Trend Micro which reveals that their is a dire need for […]

State of Small Business Cybersecurity in North America

Small business owners know they are at risk for cyberattacks, but they are somewhat at a loss as to what to do. That’s one of the findings of a new report from the Better Business Bureau, The State of Small Business Cybersecurity in North America, released today as part of National Cybersecurity Awareness Month. Read […]

Data analytics, cybersecurity and mobile technology among the top 10 challenges for health executives in 2018

Health IT is evidently top of mind for healthcare executives going into 2018. Data analytics, cybersecurity and harnessing mobile health technology were listed among the top 10 challenges for executives, according to a survey by the Healthcare Executive Group. Read about the new survey by Healthcare Executive Group which reveals that Data analytics, cybersecurity and mobile technology […]

Most APAC firms have suffered breach, but security still not priority at board level

Most businesses in Asia-Pacific have experienced a security breach, but 44 percent of IT decisions makers believe cybersecurity still is not a top priority at boardroom discussions. Read about the new report by Fortinet which reveals that 86 percent of organisations from APAC region had suffered a security breach over the past couple of years but […]

Data Breach Notification Most Clicked Subject in Phishing Tests

The most common subject line to get an employee’s attention and act to click relates to data breaches. According to the top 10 global phishing email subject lines for Q3 2017 by KnowBe4, examining email subject lines from simulated phishing tests, the most clicked was ‘Official Data Breach Notification.’ Read about the new report by KnowBe4 […]

Report: 5 Small Business “Sins” Potentially Leading to a Data Breach

It seems incredible, but people in organizations still use weak passwords like “12345,” bearing in mind the security threat in today’s digital ecosystem. This is one of the data points the 2017 edition of the annual BeyondTrust research report revealed. Read about the infographic and report titled, “The Five Deadly Sins of Privileged Access Management […]

ACSC finds rising sophistication of cyber threats along with exploitation of publicly known vulnerabilities with known mitigations

The Australian Cyber Security Centre (ACSC) released its Threat Report 2017 today. The ACSC is the focal point for the cyber security efforts of the Australian Signals Directorate (ASD), Computer Emergency Response Team (CERT) Australia, the Defence Intelligence Organisation (DIO), the Australian Criminal Intelligence Commission (ACIC), the Australian Federal Police (AFP), and the Australian Security […]

Half of ITDMs: Cybersecurity Still Not a Top Priority for the Board

Almost half of IT decision makers (ITDMs) think members of the board still do not consider cybersecurity to be a top priority, according to findings from Fortinet’s Global Enterprise Security Survey. Read more about the new Fortinet’s Global Enterprise Security Survey which reveals that 48% of the decision makers believe that business executives are not making cybersecurity […]

Survey: Most utility executives say cybersecurity is a top concern

Cybersecurity is a growing concern for utilities. In May, President Donald Trump issued an executive order on cybersecurity that included a call for the Department of Energy to assess gaps in the cybersecurity of the power grid. Read about the new report by Accenture which reveals that 63% of utility executives globally believe their country […]

Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the problem. Read about the new Ovum report which reveals that 78 percent of IT executives of those surveyed said that they lack the ability to control access to […]