View Post

Cybersecurity Insights from 2016 Security Breaches

In Security by Daniel Newman1 Comment

In 2016, more than 2 billion records were reported stolen in breaches that occurred the same year and just-discovered breaches from the past. The Identity Theft Resource Center recorded 980 breaches during the calendar year, accounting for millions of stolen high-value records (including Social Security numbers, driver’s license numbers, medical, and financial information). These increasingly common incidences offer valuable cybersecurity …

View Post

Security Monitoring: Safeguarding Your Cloud 

In Security by Daniel Newman1 Comment

Monitoring is a key component of cloud security. Firewalls, access controls, and encryption stand guard around the clock, but monitoring ensures every other security measure works properly. If cloud monitoring is not currently part of your cybersecurity strategy, consider incorporating monitoring activities this year. Why You Need Cloud Security Monitoring Measures Cloud technology appeals to businesses and IT departments because …

View Post

To Have and to Hold: Married to the Internet of Things

In IoT by GuestLeave a Comment

For several years we have been carefully observing the evolution of the Internet of Things (IoT). For those not familiar with the term, it refers to the connectivity of virtually every modern “smart” device that is being manufactured for the home, office, automobile … you name it. If it has a “chip” and can access Internet, then it is at …

View Post

Predictive Analytics and the Future of Cybersecurity

In Security by Daniel Newman1 Comment

Today, cyberspace operates like a warzone. Attacks are intelligent and measured, the enemy is at your backdoor, and your best guys, your IT team, are on the front lines. If you planned on being Switzerland – neutral and unassuming – it’s time to face reality. Cyberattacks happen to the best of us, with no warning and no way to retaliate …

View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

View Post

Dell Report Reveals Iranian Hackers Used LinkedIn to Spy

In Security by Shelly KramerLeave a Comment

How often have you gotten a social media connection request from a person you didn’t know well, or perhaps even at all? Did you reject it immediately, accept, or do a little research first? Many people skim the profiles of potential connections to determine the validity of an unknown request—that is, the perceived validity. What if those seemingly random requesters …

IT Security Needed More Than Ever For SMEs

In CIO/IT by Daniel NewmanLeave a Comment

It’s hardly a secret when a large corporation gets hacked—it’s the opposite, actually. News of controversies and scandals for big business spreads quickly (like the recent Target and Ashley Madison data breaches). Just because they sometimes don’t make the front page, it’s important to remember that smaller scale breaches do happen and happen often. In fact, small to medium enterprise …

View Post

Four Steps to Protecting Your Utility Management System from Hackers

In Security by Shelly Kramer1 Comment

Every day it seems as though there’s another hacking story in the news, the most recent of which is yet another hacking by the Chinese of the federal government’s databases, this time gaining access to personal information on some four million current and former federal employees. Troubling, to be sure. More troubling if you happen to be an IT pro …