logo
October 26, 2020 | Ryan Brooks

Security Analytics

As cybersecurity threats evolve, companies must adapt and rethink their security strategies. This means moving away from traditional technologies and towards new cybersecurity frameworks. One such framework is the NIST cybersecurity framework, which comprises five major functions: Identify ...
September 17, 2020 | Jeff Melnick

Top 6 Security Threats in Cloud Computing and How to Mitigate Them

In this digital era, more companies are encouraging or requiring employees to work from home. In addition to allowing employees to access the corporate network using their own devices, they are also turning to cloud computing, which is cost-effective and scales easily. However, not all of these...
October 13, 2020 | Jeff Melnick

How to Detect Ransomware

The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to disrupt operations badly enough and long enough that the organization will pay the ransom.” The...
August 21, 2020 | Ryan Brooks

Cloud Storage Security: Common Issues, Best Practices and Software Solutions

Cloud storage has become mainstream. It is one of the fastest-growing segments of IT spending and an indispensable tool for many modern businesses. However, not enough is being done to secure data residing in the cloud. According to Gartner, 90% of organizations that fail to control public cloud...
October 2, 2020 | Mike Tierney

Data Security in Cloud Computing: Key Components

Businesses of all sizes are moving to the cloud to take advantage of the greater data availability, significant cost savings and data redundancy that cloud computing provides compared to a traditional data center-based physical infrastructure. Moving to the cloud can also reduce shadow IT and get...
October 20, 2020 | Ryan Brooks

How to Prevent Malware Attacks: 10 Security Tips

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to: Protect sensitive information and critical...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
October 13, 2020 | Simon Fernand

How to Ensure Security of Google Drive for Business Use

It’s no secret that Google dominates the digital realm: internet searches, email, cloud storage, file sharing and more. Today, over 5 million businesses use G Suite, a set of intelligent and collaborative tools that includes Gmail, Google Docs, Google Slides, Google Sheets and Google...
October 13, 2020 | Jeff Melnick

External Users and Guest Access in Microsoft Teams: A Complete Guide

Microsoft Teams is the device-agnostic, all-in-one cloud collaboration platform for Microsoft 365 users. With its open and flexible permissions policies, Teams lets you communicate and share content with other users, both inside and outside your organization. However, external collaboration...
August 11, 2020 | Maurizio Taglioretti

GoDaddy Data Breach

GoDaddy, the world's largest domain registrar, has confirmed that 28,000 of customer web hosting accounts were compromised in a security incident in October 2019. GoDaddy has over 19 million customers, 77 million managed domains and millions of hosted websites. Here’s what you need to know about...
Show more articles
...