Blog

Blog

Cyber Security: Not Just For Financial Institutions

For many years, financial institutions have understood the importance of having a strong cyber security strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data

What Does an IT Audit for a Healthcare Organization Look Like? 

As a healthcare provider, it’s essential that your information security is top notch. The Health Insurance Portability and Accountability Act (HIPAA) requires all organizations in the healthcare industry to take steps to keep their patient data safe. Are you doing enough to prevent a breach?

If you have any doubts about the security of your IT

Why a Virtual CISO is the Best-Kept Secret in Information Security

The twin gas pedals of globalization and technology have increased the speed of business to the point where you can blink and suddenly not recognize the landscape around you. This is especially true when it comes to information security, where the very concept of “hacking” and data theft went from Hollywood science fiction to a pressing fact of

How to Retain Your Information Security Team

Acquiring talented IT security professionals is a big task for any organization, especially considering the rapidly growing skill and  generation gap in cybersecurity . In fact, the only thing that’s more difficult than acquiring highly skilled employees is figuring out how to retain them once they’re hired. This is particularly true given the

What Do The Worst Passwords of 2015 Say About Us?

In the 2015 edition of its annual worst passwords list, password management company SplashData revealed the 25 most common (and most easily compromised) passwords for the year. Based on an analysis of more than 2 million passwords revealed through searches of publicly available plain text data dumps, the report found that the Internet public is

5 Cyber Security Lessons Learned in 2015

It’s no secret that 2015 was another challenging year in cyber security. While fallout continued from the Sony hack, new threats emerged and each one offered a lesson for the future. Here’s what can be learned from the past year as you plan for 2016.

1. Keep Backups

One of the biggest cyber security stories of the year was the rise of “ransomware,”

5 Common Programming Languages That Cause the Most Software Vulnerabilities

Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause

WordPress and Health Applications Are Now the Most Popular Web Attack Targets

Research shows that WordPress and health applications are the most popular targets for online attacks. If you’re currently using WordPress for your website or offering a healthcare app, here are some key facts and figures you should know.

 

Content Management Systems Are Most Vulnerable

A new report by Imperva revealed that content management

Your 4-Step Guide to Security Budget Planning for 2016: Part 2

Once again, it’s time to plan your security budget for the next year. In our last post, we discussed planning and implementing as the first two steps of planning your 2016 security budget. Now, let’s look at the final two steps: execution and analysis.

 

Execution

Successful execution of a security plan involves detecting new risks and monitoring

6 Secure Password Management Systems for Your Business

Protecting the passwords of all your employees is a key part of IT risk management. Password management systems, in combination with other cybersecurity systems, can help to protect workers from becoming victims of hacking. Here are six of the best secure password management systems for businesses.

Dashlane Premium

Dashlane Premium is available