How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Read/see the slideshow explaining […]

How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Read/see the sideshow explaining […]

The 6 Riskiest Social Media Habits to Avoid at Work

Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk. Read/see the slideshow explaining the six riskiest social media habits that employees should avoid at work on Dark Reading.

Dealing With Email Security Threats

Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches. However, despite perceptions that these attacks mostly originate from the outside, many breaches are connected to internal glitches, breakdowns and problems, according to a February 2017 report from email security vendor Mimecast […]

7 tips to strengthen online security

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily […]

Cisco Cyber-Security Report Finds Server Threats Increased in 2016

Security breaches aren’t just a nuisance. They can also have real financial impact on the organizations that are exploited. That’s one of the many high-level findings from the Cisco 2017 Annual Cybersecurity Report (ACR). The massive 110-page report provides insights from Cisco’s own research efforts as well as a survey that received responses from 3,000 […]

Companies Are Ill-Prepared for Cyber-Attacks

A recent survey reveals that most organizations are not prepared for outsider attacks, data vulnerability, insider sabotage, user errors and phishing. It also explores security concerns when migrating to the cloud and reports that IT-decision-makers fear for their jobs. Read/see the slide show explaining how companies are still ill-prepared for dealing with cyber attacks on […]

Security and Privacy Concerns Dog the Cloud

Security and privacy of data and systems in the cloud remain a top worry for the majority of IT professionals worldwide, according to a new survey. Furthermore, unauthorized access, malware and DoS attacks are the top three cloud security concerns today. Read/see the slideshow explaining how security and privacy issues continue to dog cloud adaptation […]

A Look Into Cyber Security

Network security in cyberspace is never far from the headlines. When it does reach the headlines, it’s never good news. Here are just a few famous – or infamous – security breaches of the not-too-distant past, even though they might seem like ancient history by now: Target, Adobe, TJX, Home Depot, Sony Playstation, Heartland, Epsilon. […]

How to eliminate insider threats

For years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. Read/see the slideshow explaining how companies can eliminate the […]