Blog

Blog

Top Five Takeaways of Information Security in 2017

The nature of information security is that it is ever evolving. As we become more technologically advanced, new challenges present themselves. The key is to never become complacent, and always keep an eye out for advancements that can protect you, your team and your clients.

 

Regulatory compliance moves at a pace that attempts to keep up with

Cyber Security: Not Just For Financial Institutions

For many years, financial institutions have understood the importance of having a strong cyber security strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data

5 Smart Tips to Back Up Your Data Now

In a world where every company’s business is increasingly its own data, it’s always a good idea to ensure that data is backed up. This is especially true in the way it encourages adopting a proactive security mindset, allowing small and mid-sized businesses to address the risk of a cyber attack or security breach before it happens.As ransomware

What Small Companies Should Really Know About Cloud Security

While the bulk of data security breaches affect large corporations, hackers can target small and medium-sized enterprises (SMEs), too. As a result, small businesses — often deemed an attractive target by cybercriminals because these companies lack the infrastructure of multi-million dollar conglomerates — are investing heavily in cloud security.

3 Key Guidelines for CISOs in the Era of the Cloud

Before the cloud, most business chose to store their data on internal servers they managed. Because of this, accessibility typically was limited to helping reduce how vulnerable a business's information was to hackers. With the inception of the cloud, companies have poured billions of dollars into this technology and the corresponding cyber

How to Retain Your Information Security Team

Acquiring talented IT security professionals is a big task for any organization, especially considering the rapidly growing skill and  generation gap in cybersecurity . In fact, the only thing that’s more difficult than acquiring highly skilled employees is figuring out how to retain them once they’re hired. This is particularly true given the

3 Tips to Encourage Collaboration In Your Organization's Security Processes

While information security has assumed top priority in many organizations, the steps that enterprises take to strengthen their overall cybersecurity often focus solely on improving the technology and processes involved in those efforts. Unfortunately, such a heavy focus on the technical mechanics of cybersecurity neglects the human side of the

5 Employee Password Habits that are Putting Your Enterprise at Risk

A truism of the modern workplace is that your employees underestimate the risk that their password habits present to your enterprise. Indeed, a study of password habits by CSID in 2012 showed that more than 60 percent of respondents used the same password on multiple sites. Even worse, nearly 45 percent of those respondents said they changed their

How CISOs Can Improve the Cybersecurity Landscape

In larger environments, it is not uncommon to have both a CIO/CTO and CISO (Chief Information Security Officer). The CTO/CIO is usually held accountable for the development and implementation of the IT strategy to support the institution's business strategy in line with its risk appetite. A CISO is typically responsible for overseeing and

Is There a Generation Gap in Cybersecurity?

According to a recent survey by Raytheon and the NCSA, young people ages 18 to 26 aren't pursuing careers in cybersecurity. Young women - who make up just 10 percent of the industry's workforce - are even less interested in cybersecurity than their male counterparts, with 52 percent of millennial women saying cybersecurity programs aren't