Phishing attacks remain a threat to enterprise systems and data, and the method of entry is no longer limited to email. Your employees may not be trained to recognize some of the newer attempts to gain access to your technology. The typical phishing attempt is still carried out through a legitimate-looking email message. The telltale sign is the sense of urgency to take action so as to gain or avoid something. The specific format of phishing attacks continues to evolve, with some looking like … [Read more...]
Testing the Security of Your Communications Systems
Your communications systems provide critical access to customers and business partners, and you likely have an extensive security policy in place to ensure their protection. From encryption to next-generation firewalls, you have taken time to consider different types of attacks that could threaten your Voice over Internet Protocol (VoIP). From a response standpoint, you likely have a disaster recovery plan in place that includes steps for recovering backup data and continuing business … [Read more...]
Systemic Attacks Call for More Layers of Cyber Security
Cyber attacks are becoming systemic. Public cloud providers are in the crosshairs, as are Software as a Service providers. Attacks such as May 2017's WannaCry show the extent to which a ransomware cryptoworm can travel across continents, impacting a majority of the world. It’s just one example of why cyber security strategies must be fine-tuned to protect data, regardless of how small your organization might be. Cyber criminals are experts at finding weak points where they can launch an … [Read more...]
How Do You Do BYOD Right?
It’s difficult to imagine employees not bringing their own device to work in this mobile-friendly era. Some might even bring two or three. While these devices are for personal use, they’re also being implemented to tackle day-to-day tasks, which is why most employers have no problem with the bring your own device (BYOD) revolution. With the growth of BYOD across industries, it is critical for all businesses to establish a safety policy to protect important data. Securing the … [Read more...]
Navigating the 3 Stages of Cloud Transformation
The cloud has evolved from a place where developers and other IT professionals go to experiment and play to one where enterprises must make investments in order to stay relevant and offer the experience customers demand. Cloud transformation is no longer a perk for companies, but a necessary step to remain competitive. Enterprises recognize the need to apply quick action to business decisions, and cloud transformation allows for more agility and innovation to support improvements or new … [Read more...]
4 Reasons You May Want to Consider IT as a Service
As enterprises pursue digital transformation initiatives, the way in which they are accomplishing these goals is changing. The shifting of workloads to the cloud begins to illuminate other areas of technology that could be removed from the daily, in-house tasks of the IT department. Many enterprises are paying for IT as a service and finding that its benefits quickly justify the cost. IT as a service can be a good investment for any size business. A small or midsize company can benefit from … [Read more...]
Why It Pays to Invest in Business Continuity Management
Enterprises often focus on the cost of lost data when they anticipate the damage of a cyber security breach. Much of the impact of a breach is the often-unanticipated cost of lost time and productivity as your security team rushes to detect and address the breach. Business continuity management creates a plan for keeping your team operating while a breach is being handled. A study conducted by IBM in partnership with the Ponemon Institute entitled, “2018 Cost of Data Breach Study: Impact of … [Read more...]
Identifying Threats to Cloud Infrastructure Security
While it’s always ideal to build security automation into the software development process, it’s never too late to engage in threat modeling to better understand cloud infrastructure security. The practice provides a way for organizations to better understand any potential vulnerabilities, as well as develop a strategy for managing threats. The following steps will help you create a threat model for cloud infrastructure security: Identify your team: The ideal combination includes … [Read more...]