Phishing attacks remain a threat to enterprise systems and data, and the method of entry is no longer limited to email. Your employees may not be trained to recognize some of the newer attempts to gain access to your technology. The typical phishing attempt is still carried out through a legitimate-looking email message. The telltale sign is the sense of urgency to take action so as to gain or avoid something. The specific format of phishing attacks continues to evolve, with some looking like … [Read more...]
Testing the Security of Your Communications Systems
Your communications systems provide critical access to customers and business partners, and you likely have an extensive security policy in place to ensure their protection. From encryption to next-generation firewalls, you have taken time to consider different types of attacks that could threaten your Voice over Internet Protocol (VoIP). From a response standpoint, you likely have a disaster recovery plan in place that includes steps for recovering backup data and continuing business … [Read more...]
Systemic Attacks Call for More Layers of Cyber Security
Cyber attacks are becoming systemic. Public cloud providers are in the crosshairs, as are Software as a Service providers. Attacks such as May 2017's WannaCry show the extent to which a ransomware cryptoworm can travel across continents, impacting a majority of the world. It’s just one example of why cyber security strategies must be fine-tuned to protect data, regardless of how small your organization might be. Cyber criminals are experts at finding weak points where they can launch an … [Read more...]
How Do You Do BYOD Right?
It’s difficult to imagine employees not bringing their own device to work in this mobile-friendly era. Some might even bring two or three. While these devices are for personal use, they’re also being implemented to tackle day-to-day tasks, which is why most employers have no problem with the bring your own device (BYOD) revolution. With the growth of BYOD across industries, it is critical for all businesses to establish a safety policy to protect important data. Securing the … [Read more...]
Cyber Security and the Remote Worker: Safeguards to Consider
Technology allows for remote work opportunities that didn’t exist 10-plus years ago. More and more workers are looking for opportunities that afford them increased flexibility in where they put in their hours — and companies are giving it to them — but at what cost? There are a number of cyber security issues that arise with the remote worker that must be addressed. You might have done everything you can to secure your network at the workplace, but when remote workers are logging in via … [Read more...]
Why Small Business Cyber Security Is Vital
The headlines about data breaches usually focus on the bigger companies, like Target, Yahoo and Marriott, as well as health care institutions when they get hit. That might fuel the belief that cybercriminals only target the big guys, but it’s not true. Small business cyber security strategies must be in place to protect the little guys, as well.The United States Cyber Security Alliance conducted research recently and found that small business cyber security is important because it protects … [Read more...]
Cyber Security: Why Small Businesses Are Targets
You may think that, because you operate a small business, cybercriminals won’t target you for a breach. But, almost 43% of cyber attacks are directed at small businesses, according to Symantec. That means you have to take cyber security solutions seriously. Cyber attacks hurt everyone who gets hit, but small businesses without much cushion to fall back on might be crippled or face a terminal situation. Considering how evolved the attacks have become and how frequently they occur, taking a … [Read more...]
Why It Pays to Invest in Business Continuity Management
Enterprises often focus on the cost of lost data when they anticipate the damage of a cyber security breach. Much of the impact of a breach is the often-unanticipated cost of lost time and productivity as your security team rushes to detect and address the breach. Business continuity management creates a plan for keeping your team operating while a breach is being handled. A study conducted by IBM in partnership with the Ponemon Institute entitled, “2018 Cost of Data Breach Study: Impact of … [Read more...]
Identifying Threats to Cloud Infrastructure Security
While it’s always ideal to build security automation into the software development process, it’s never too late to engage in threat modeling to better understand cloud infrastructure security. The practice provides a way for organizations to better understand any potential vulnerabilities, as well as develop a strategy for managing threats. The following steps will help you create a threat model for cloud infrastructure security: Identify your team: The ideal combination includes … [Read more...]