View Post

Cybersecurity Insights from 2016 Security Breaches

In Security by Daniel Newman1 Comment

In 2016, more than 2 billion records were reported stolen in breaches that occurred the same year and just-discovered breaches from the past. The Identity Theft Resource Center recorded 980 breaches during the calendar year, accounting for millions of stolen high-value records (including Social Security numbers, driver’s license numbers, medical, and financial information). These increasingly common incidences offer valuable cybersecurity …

View Post

How to Easily Evaluate Managed Hosting Providers (MSPs)

In Security by Carolina Curby-LucierLeave a Comment

Managed hosting has evolved to include more than just hardware in a remote data center. Providers offer services like virtualization, performance monitoring, security management, load balancing, and other valuable solutions that are an integral part of your operations. Simplify and significantly speed up the search for the perfect managed hosting provider (MSP) by determining your current needs, as well as …

View Post

Security Monitoring: Safeguarding Your Cloud 

In Security by Daniel Newman1 Comment

Monitoring is a key component of cloud security. Firewalls, access controls, and encryption stand guard around the clock, but monitoring ensures every other security measure works properly. If cloud monitoring is not currently part of your cybersecurity strategy, consider incorporating monitoring activities this year. Why You Need Cloud Security Monitoring Measures Cloud technology appeals to businesses and IT departments because …

View Post

Healthcare Ransomware Attacks to Double by 2018 [Report]

In Security by Shelly KramerLeave a Comment

There can be little doubt that recent technological advances have enormous potential to benefit both patients and practitioners across the healthcare sector. As administrators and engineers strive to capture the benefits sensor technology and big data analysis can offer however, EHR systems are increasingly coming under threat from cyber security breaches, and, in particular, from increasingly sophisticated ransomware attacks. That …

View Post

How Signing Emails Can Help Keep Your Company Secure

In Security by Shelly KramerLeave a Comment

On average, business users send and receive 42 emails per day via a number of devices, including smartphones, tablets, and desktop computers. All that online activity is inviting to hackers, which is why phishing and malware attacks are common in office email breaches. Are the email accounts in your office protected? We’ve discussed cyber security in the past, including strategies …

View Post

Predictive Analytics and the Future of Cybersecurity

In Security by Daniel Newman1 Comment

Today, cyberspace operates like a warzone. Attacks are intelligent and measured, the enemy is at your backdoor, and your best guys, your IT team, are on the front lines. If you planned on being Switzerland – neutral and unassuming – it’s time to face reality. Cyberattacks happen to the best of us, with no warning and no way to retaliate …

View Post

Creating Mobile Computing Experiences

In Mobility, Security by Daniel NewmanLeave a Comment

The advent of smartphones created the desire for full functionality that fits in the palm of your hand. Apps have become a mainstay of mobile technology, offering specialized functionality in an incredibly vast spectrum of customer desires and interests. Now, mobile technology is a lynchpin of modern business. Users don’t simply want a smartphone—they’re looking for mobile computing experiences. Experience …

View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

View Post

The Hard Line Between Disaster Recovery Planning and Experience

In Security by Daniel NewmanLeave a Comment

Balancing proactive and reactive business approaches is tricky. If you wait too long to address a risk, your business could suffer a major blow, but investing in a what-if scenario costs time and money that may not be the best investment—unless you consider peace-of-mind about your company’s future a sound financial investment. Too many times, companies who fail to invest …

View Post

Security Is a Must, But Is It Costing Productivity?

In Security by Daniel NewmanLeave a Comment

In past posts, I’ve discussed how important it is for companies to focus on their IT security strategy. When strategy becomes too rigid, however, employees pay the price. Accessibility issues create extra work for the help desk, slowing a company’s productivity. How do you balance security and productivity? The two don’t have to work against each other. You can protect …