}

Breaches and How to Respond to Them

Breaches aren’t completely avoidable, even with good security measures in place. A zero-day vulnerability are easy to find, for example. You’ll never get ahead of the hackers. But there are a lot of simple controls that aren’t implemented that cause...
Employee mistakes a big source of data breaches

Employee mistakes a big source of data breaches

When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by CompTIA it isn’t an unknown hacker that’s most likely to directly...
Mobile Devices Pose Security Risks

Mobile Devices Pose Security Risks

Because smartphones and tablets are now ubiquitous, many companies have adopted “bring your own device” (BOYD) and “corporately owned, personally enabled” (COPE) policies to deal with their use in the workplace.  Even with robust BOYD and COPE safeguards in place,...
Why SMBs Are Under Cyber Attack

Why SMBs Are Under Cyber Attack

Though corporate giants like Target, Anthem, and Home Depot get most of the media attention for cyber attacks, small and medium-sized businesses (SMBs) are actually more likely to be attacked.  Yes, you read that correctly.  According to the Verizon 2013 Data Breach...

Data Destruction – Are You Prepared?

A hacker could come after your company’s data at any time. Are you prepared? Trying to recover from a digital attack can be very costly – including hiring computer forsenics experts to figure out where the data leak came from and to plug the digital hole. Buy...
Retail and Hospitality Industries Targeted by Cyber Thieves

Retail and Hospitality Industries Targeted by Cyber Thieves

Over the last couple of years, large breaches of major retailers such as Target, Home Depot, and Neiman Marcus have made it clear that the retail and hospitality industries are prime targets for cyber attacks. The reason is simple: A vast amount of personally...