How ISO 27001 Certification Delivers Business Value

The accelerated adoption of digital technologies is a bit of a double-edged sword. While it clearly drives new levels of efficiency, productivity and innovation, it can also introduce new vulnerabilities. Increased reliance on cloud, mobile, edge and wireless technologies to support remote and hybrid workforces substantially expands the typical organization’s attack surface.

Encrypt Email to Guard Against Data Leaks

Fifty years after it was invented by an MIT engineer, email remains the world’s most popular business communication tool. Unfortunately, it is also the single greatest source of business data leakage.

A whopping 95 percent of IT leaders say that customer and company data is at risk on email, according to the 2021 Data Loss Prevention Report by the cybersecurity firm Egress.

Adopt a Zero-Trust Approach to Securing Endpoint Devices

Remote and mobile working gives organizations the flexibility and agility they need to meet today’s operational requirements. Unfortunately, it also creates a multitude of new security challenges.

Cybercriminals are increasingly targeting endpoint devices such as laptops, tablets and mobile phones because they provide a direct route into corporate networks.

Why Penetration Testing is Critical to Network Security

In our last post, we discussed how regular network assessments can help organizations identify any gaps in their security posture in order to make the necessary modifications to close those gaps. A penetration test, or pen test, is perhaps the most critical element of a comprehensive testing process.

Regular Assessments Key to Understanding Your Security Posture

The FBI has confirmed that 2020 was a record year for cybercrime in the U.S., with all-time highs in both the number of attacks reported and the resulting financial losses. For the year, the FBI’s Internet Crime Complaint Center received 791,790 cybercrime complaints (up 69 percent from 2019) with reported losses exceeding $4.1 billion.

Immutable Storage Is Your Best Hedge Against Ransomware

Ransomware is a cash cow for cybercriminals, netting more than $350 million in ransom payments last year — although it is likely much more because many victims don’t report attacks in order to preserve their reputation. It’s easy money for the crooks because most companies just pay the ransom so they can regain access to their encrypted data and get back to business as quickly as possible.

5 Considerations for Your Cloud Security Framework

As organizations continue to shift more and more workloads to the cloud, they may inadvertently create security vulnerabilities. Recent research finds that configuration errors, insecure interfaces, unpatched applications, and poor encryption and authentication practices are opening the door for a variety of exploits.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload