13
Dec

7 Lesser-Known Security Tips for Your New Device

Hoping to find a new laptop, tablet, smartphone or other device under the tree? Every time you use technology, whether at work or at home, you are sharing personal identifiable information (PII). With any new device, you must take precautions to ensure safe processing and storage of this data. Without a proactive-security approach to defend against hackers and identity thieves,

Read more

14
Nov

What You Need to Know About Bot-driven Attacks This Holiday Season

Excited for the holidays to get underway? So are hackers. Online retail transactions are 10 times more likely to be fraudulent than even those of the financial services sector, according to the Threat Metrix Q1 2018 Cybercrime Report. With the busiest shopping season of the year less than a week away, cybercriminals are taking every advantage with bot-driven attacks, one

Read more

4
Oct

4 Action Items for National Cyber Security Awareness Month

From election interference allegations and natural disasters to topics like cloud-service misconfigurations and API vulnerabilities the industry has been experiencing over the last couple of months, no one is immune to data breaches. Your systems and data are a constant target for hackers on the hunt. In fact, according to the Verizon 2018 Data Breach Investigation Report, a whopping 58%

Read more

7
Sep

Top 4 Cybersecurity Tips for Successful Cloud Computing

The security hits keep coming from all directions, and misconfigurations in third-party Application Programming Interfaces (API) are quickly becoming one of the fastest-growing vulnerabilities for malicious activity. These kinds of problems reinforce just how critical it is to never assume Software as a Service (SaaS) or cloud service providers have the proper security in place to protect your information. In

Read more

8
Aug

The 1 Thing You Need Most When Converting to the Cloud

In today’s cyber-threat landscape, there is no room for human error when setting up your cloud systems. Whether you have an internal IT team or an outside service provider, cloud conversion isn’t something just anyone can do. The latest misconfiguration mishaps with Amazon Web Services (AWS) Server buckets being set to allow anyone in the public to access confidential information

Read more

10
May

3 Tactics to Boost Your Confidence in Adopting New Technologies

Adopting new technologies is crucial to business growth; yet, worries about how to properly secure it are keeping small and medium-sized business owners from making this important investment, according to a recent Forrester Research study commissioned by the Columbus Collaboratory. In fact, 56% of business owners surveyed indicated that securing hybrid cloud technology caused them high or very high anxiety.

Read more

6
Mar

How to Prepare for GDPR – A CISO’s Perspective

The General Data Privacy Regulation (GDPR) will come into force on May 25, 2018. This regulation requires companies in all countries who perform payment-card transactions with any citizen of the European Union (EU) to maintain a stringent plan that protects their personal data and privacy. Without the required security tools, controls and documentation in place, failure to comply with GDPR

Read more

13
Feb

What You Need to Know about PCI DSS 3.2

The Payment Card Industry Data Security Standard (PCI DSS) published by the Payment Card Industry Security Standards Council (PCS SSC) is a set of regulations businesses must use to safeguard the financial and personal data of their customers throughout every point of a transaction. In response to the increase in payment information threats, version 3.2 of the PCI DSS is

Read more

2
Jan

2 Critical Factors to Building a Strong Security Program for Your SMB

Cyber threats are increasing at an alarming rate, which means it is only a matter of time before your business will have to investigate some sort of an attack. With more than 60% of businesses closing their doors within six months of a breach, threat knowledge and proactive strategies are vital to reducing your risk. Here are two key factors

Read more

15
Dec

4 Ways to Protect Your Business This Holiday Season

Cybercriminals know businesses and their employees are more likely to share large amounts of information online this time of year. In addition to accessing account information via online merchants, attackers are also able to gain data from insecure Wifi systems, phishing scams and malware. The average cost is $244 per compromised record. Here are four ways to proactively safeguard your

Read more