Blog

Why Passwords Alone Are Not Enough Believe it or not some people – in fact many people – are still using terrible passwords to “secure” access to their personal and business accounts.  The purpose of passwords is to prevent unauthorized access to your accounts.  By now, most of us know that using strong passwords, that is, passwords that are hard to guess, is a basic cybersecurity practice.  The majority of workplaces should have password security policies...
Healthcare Entities Must Consider The Consequences Of Not Making Cyber Security A Top Priority Cyberattacks against the healthcare industry are on the rise and barely a week goes by without news of a patient data breach or attack on a hospital or healthcare provider. With healthcare organizations embracing new technologies and digitizing their operations to improve efficiency, so too do they take on new risks. Without adequate cyber security, IoT security measures, enforced policies, and a...
Zscaler Celebrates Major Milestone: Publicly Listing on Nasdaq Cloud security company Zscaler, Inc., celebrated a major milestone on Friday, March 16, 2018 making its debut on the Nasdaq. The now publicly traded company (under the symbol ZS) develops a software-as-a-service based cloud security platform that secures access for users and devices to internet applications. Zscaler, which was incorporated in 2007 and headquartered in San Jose, California, operates its integrated cloud-delivered internet security solutions globally. Zscaler’s 100 data...
Vulnerability Risk Management: A Top Security Challenge And Priority There are more devices connected to the internet than ever before and the number of connections is growing daily at a phenomenal rate. The overall Internet of Things (IoT) market is projected to be worth more than one billion U.S. dollars annually from 2017 onwards. As more and more devices become internet connected, the greater the opportunities for hacker to exploit vulnerabilities in these connected electronic devices...
CrowdStrike’s Latest Global Threat Report Reveals Cyber Trends and Predictions The volume, intensity and sophistication of cyberattacks has hit new highs and cyber adversaries can launch massive, destructive attacks rendering organizations inoperable for days or weeks. So, what makes these attacks so effective?  They are essentially immune to the traditional endpoint defense technologies that most organizations have relied on for the past 20 or more years.  Recent attacks have leveraged “military-grade” exploits and cyber tools made...
In last week’s blog post we looked at the United States’ commitment to combating cyber-risk and were encouraged to see the U.S. ranked second out of 193 countries in terms of highest commitment to cybersecurity (2017 Global Cybersecurity Index). This commitment is reflected in the Federal Government’s allocation of nearly $15 billion to fund agencies and programs focusing on IT modernization and cybersecurity in Fiscal Year 2019. But what about the commitment to online initiatives...
Cyber risks are growing, both in their prevalence and in their disruptive potential, as individuals, companies and government agencies become increasingly more dependent on technology.  New and more sophisticated threats continue to emerge with cybercriminals using artificial intelligence and machine learning to conduct attacks.  In addition, the explosive growth of the ‘internet of things’ is expanding the surface open to cyberattack as millions of new interconnected devices, most with little built-in security, come online. It...
Employees: a company’s greatest asset or risk Employees are at the heart of every business and can be a company’s greatest asset or its biggest threat when it comes to securing sensitive data and information. Lack of employee cyber security education and awareness, along with human error or careless behavior have been the cause of many major security breaches. Workers can unknowingly aid hackers by giving out sensitive passwords, losing back-up information or devices, inadvertently...
Wireless mobile communication technologies continue to evolve and have completely transformed the telecommunications industry in the last few decades. New mobile communications technologies come around roughly every ten years and with every new “generation” come a multitude of benefits offered by the convenience of mobility. The next generation — 5G, the fifth generation of wireless networks — is expected to to be launched later this year, and to be made widely available in 2020 and beyond....
Whatever industry you are in, regardless of business size, cybersecurity must be considered a top priority and an integral part of the digital transformation journey. Most organizations are aware of the need to allocate resources to protect themselves from information security breaches, data loss, fraud, and financial loss and have focused on building up the technical aspects of their IT security strategy through adoption of various technology tools and products. Global spending on information security...