logo
December 31, 2020 | Elena Vodopyan

2020: IT Security Lessons to Learn

The year 2020 reshaped business processes and accelerated changes in the way we work, communicate and live. The shift to remote work put a lot of strain on business processes, IT departments and security teams, and cybercriminals used panic and chaos to exploit the situation. Here, we analyze...
December 28, 2020 | Ilia Sotnikov

ROI: Expert Tips for Justifying Security Investments

The challenges of ROI in IT security Over the last few months, I’ve had a number of conversations about the need to justify security spending. This year has been tough for a lot of organizations, so IT budgets are generally not growing. Plus, the money already allocated often had to be...
December 24, 2020 | Ryan Brooks

Data Security: What Happened in 2020, Continues in 2021

The year 2020 has been a time of unprecedented change. This year’s events continue to alter the course of cybersecurity, making it even more important to ensure that we better prepare ourselves for what’s to come. In this blog post, we review the key data security trends of 2020 and share...
October 28, 2020 | Ryan Brooks

What Is Password Spraying, and How Can You Spot and Block Attacks?

In 2019, a data heist at Citrix shook the cybersecurity world. The attackers stole business documents from a shared network drive and from a drive associated with a web-based tool used in Citrix’s consulting practice. The hackers gained this access to Citrix's IT infrastructure through a...
June 30, 2020 | Stewart Dunlop

Expanding Your Cybersecurity Skills when You Are No Longer a Beginner

It’s easy to find resources for getting started with cybersecurity — but far harder to find ones designed for people who are already working as cybersecurity professionals. To help, we’ve collected some great options for advancing your skills. Taking advanced training courses All too often,...
June 11, 2020 | Ryan Brooks

Cybersecurity Assessment: Definition and Types

According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches of these vulnerabilities cost large enterprises $3.92 million on average; for 60% of those breaches,...
May 15, 2020 | Ryan Brooks

What Your Small Business Cyber Security Plan Must Cover

According to research conducted by the Ponemon Institute, 66% of small and midsize businesses (SMBs) in the US, UK and Europe have experienced a malicious cyber attack in the past 12 months. This figure goes up to 76% when considering companies in the US alone. What’s more, there appears to be...
March 19, 2020 | Simon Fernand

A Vision for Strong Cybersecurity

The current state of cybersecurity The number and severity of cybersecurity threats is increasing daily. At the same time, the world is experiencing a severe and growing shortage of skilled IT security professionals. According to the 2019 (ISC)² Cybersecurity Workforce Study, the skills gap has...
August 5, 2020 | Ilia Sotnikov

Privacy Regulations Changing the Face of Cybersecurity

The regulatory climate around the world is changing rapidly. Scores of new regulations, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and similar laws in other U.S. states, are being enacted in response to growing concerns about privacy and...
March 10, 2020 | Ryan Brooks

Top 8 Cybersecurity Tips for Small Businesses

Businesses of every size must devote resources to reducing the ever-increasing risks posed by cybersecurity threats. Not a day goes by without news about new data breaches, hacks or ransomware attacks. While large multinationals may seem like prime targets, many hackers make their living focusing...
Show more articles
...