Report: Phishing attacks on the rise, executives and IT workers most likely to fall victim

Phishing attacks are on the rise, and employees at all levels of the enterprise are falling victim, according to Intermedia’s 2017 Data Vulnerability Report, released on Wednesday. Entry-level employees—commonly blamed for cyber breaches—are not the only ones at fault. Read more about the new Intermedia’s 2017 Data Vulnerability Report which reveals that one in five office worker […]

Network Security Is For All Businesses [Infographic]

Is your business doing enough to prevent data breaches? Chances are the answer is no. Many small businesses don’t see the need to prevent data breaches because they think it can’t happen to them. The reality is that everyone is a hacker’s target, and preventing data breaches may be the only way to save your […]

Why chipmakers are taking IoT security Into their own hands

Read why chipmakers are taking Internet of Things security seriously according to Majid Ahmed on Network World : While much of the talk about the Internet of Things today concerns the economic growth and impending social change being fostered by it, IoT investors and enthusiast alike are increasingly turning their attention towards network security. Read his […]

Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management

Read why Brian Evans says that companies should take a layered approach to vulnerability management on Security Intelligence : Companies need to do more than just scan for known problems and provide huge vulnerability reports to system and network administrators for remediation. According to Gartner, known vulnerabilities still comprise 99 percent of all known exploit […]

The Problem with Collecting, Processing, and Analyzing More Security Data

Read Jon Oltsik’s article about the problems companies face with collecting, processing, and analyzing cyber security data on CSO Online : Security teams collect a heck of a lot of data today.  ESG research indicates that 38% of organizations collect, process, and analyze more than 10 terabytes of data as part of security operations each month. […]

Future cyber security threats and challenges: Are you ready for what’s coming?

Read Michael Nadeau’s article about future cyber security threats and challenges on CSO Online : The world is changing, and with it so is the internet. Or perhaps it’s the other way around. The internet continues to create new business and social opportunities that massively scale and widely interconnect. Read his full article here.

Enterprise IT security planning: Five ways to build a better strategy

Read Mark Samuels list five ways enterprises can build better cyber security strategy on ZDNet : Those buzzwords recommended for building a successful digital business, such as flexibility, agility and openness, don’t always fit nicely with more sober requirements like the needs of a corporate security policy. Read his full article here.

Report: Average enterprise data breach cost rises to $1.3M

The cost of a data breach for enterprises in North America increased this year, according to a new report from Kaspersky Lab and B2B International, released Tuesday. The total impact of a data breach now amounts to $1.3 million for large companies—up from $1.2 million in 2016, the report found. Read about the new report […]

A Clear and Present Danger: Small Business Cyber Attacks

Read why Melinda Emerson says that small and medium businesses face clear and present danger from cyber attacks on Huffington Post : Yes, even your business can become a victim. It may already be a target. Although large businesses are victims of much-publicized cyber attacks, more than 60 percent of cyber attacks affect small businesses. […]

DDoS protection, mitigation and defense: 7 essential tips

Read George V. Hulme list 7 essential tips for companies for DDoS protection, mitigation and defense on CSO Online : DDoS attacks are bigger and more ferocious than ever and can strike anyone at any time. With that in mind we’ve assembled some essential advice for protecting against DDoS attacks. Read his full article here.