Are You Confident that Your Cloud Data is Secure?

While early adoption of the cloud was driven largely by a desire to reduce capital expenses and management overhead, organizations are now moving to the cloud for strategic purposes. Users can be more productive because they have the flexibility to access cloud resources, collaborate with co-workers, and serve customers from any device and location.

How the Cyber Grinches Try to Steal Christmas

In the classic Dr. Seuss children’s story, the ill-tempered Grinch sets out to spoil Christmas for all the Whos down in Who-ville. Today, there are an abundance of cyber Grinches out there looking to make the holidays a lot less joyful for all of us.

It has become an unfortunate tradition that a variety of cyber threats spike during the holiday season.

As Humans Are Overwhelmed by Security Challenges, AI Comes to the Rescue

Most security breaches can be traced back to human error. Hackers know it’s far more difficult to defeat advanced security defenses than it is to trick a human into opening the doors and letting them in. If the doors aren’t completely opened, the keys are essentially handed to hackers when organizations fail to require complex passwords, turn on security features or respond to security alerts.

How Managed Services Reduce Risk and Keep Your Business Moving Forward

When it comes to performing day-to-day functions, serving customers, operating efficiently, and maintaining a high level of productivity, most small to midsize businesses (SMBs) are as reliant upon IT systems as large enterprises. If servers crash, applications stop working or slow down, or employees can’t access network resources, SMBs lose money and are forced to play catch-up.

How to Build a Successful Security Awareness Training Program

In a previous post, we discussed not only the prevalence of phishing attacks, but the email subject lines and social media attack simulations that were most effective at getting users to click. No security solution or IT team can detect and block every phishing attack or manage shadow IT apps and services, which is why security awareness training is critical to helping users recognize and avoid these attacks.

The No. 1 Thing You Can Do to Combat Phishing Attacks

According to the FBI’s Internet Crime Complaint Center (IC3), more than 26,000 users fell victim to phishing, vishing, smishing and pharming attacks in 2018, suffering more than $48 million in financial losses. All four types of attack use social engineering to trick users into giving up sensitive information, clicking on a malicious link or attachment, or visiting a malicious website.

E-Rate Can Give K-12 Security a Much-Needed Boost

K-12 schools are collecting and storing more and more information about students, including personally identifiable information, behavioral assessments and health data, as well as grades, test scores and attendance. This data is a critical resource for evaluating students and developing personalized learning programs.

Study: Personally Identifiable Information Is Compromised in 97% of Breaches

According to a recent report on data breaches in the U.S., the personally identifiable information (PII) of consumers remains the top target of cybercriminals. A whopping 97 percent of all breaches in 2018 involved the exposure of PII. Almost half (48 percent) of breaches affected the healthcare sector, while the cost of breaches in the financial sector jumped from $8 million in Q1 2018 to $6.2 billion in Q1 2019.

The increased exposure of PII comes despite a 12.4 percent increasein spending on security products and services.