Cyber Insurance Changes

Higher premiums and stricter requirements force organizations to boost their IT security posture.

Cyber insurance provides an important hedge against business-crippling cyberattacks, but policies have become increasingly expensive and difficult to obtain as malicious attacks become more frequent, severe and costly.

Wrangling with Wi-Fi

As employees return to the office, outdated Wi-Fi networks create connectivity challenges.

Connectivity is king in a work-from-anywhere world, but outdated and unreliable Wi-Fi networks threaten to undermine hybrid and remote work models. Legacy wireless infrastructure based on older standards do not adequately support changing Wi-Fi usage patterns.

Do You Know if Sensitive Data Is Leaving Your Network?

A microchip engineer was recently accused of stealing trade secrets using a clever technique. He allegedly sent data to his personal computer by hiding schematics in image files named for Pokémon characters.

A former Tesla employee is accused of taking a less technical approach, downloading trade secrets to his personal computer and submitting a different laptop for inspection to hide his activity.

Cybercriminals Targeting Unpatched Vulnerabilities

Despite months of dire warnings about the threat potential, researchers say the vast majority of vulnerabilities in the widely used Apache Log4j logging utility for Java software remain unpatched and actively exploited. New research suggests that more than 90,000 Internet-facing Java applications and nearly 70,000 servers remain exposed to the flaw that enables attackers to remotely execute code on compromised systems.

Hide and Seek

There’s no single solution for detecting and defeating increasingly evasive malware.

Malware authors have become practiced at the art of deception, leveraging a multitude of techniques to disguise malicious payloads from conventional network security measures.

Backup Challenges

A look at multiple options for closing the gaps in data backup operations.

Today’s increasingly distributed work environments create new challenges for already complicated data backup processes. With more data — and more types of data — being generated and stored across multiple data centers, cloud platforms and endpoint devices, the vast majority of companies are dealing with significant gaps in their backup operations.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+