As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
When it comes to compliance, keeping your data secure should be one of the biggest priorities for your business. How can different companies with different requirements make sure they are compliant?
As companies grow and the business landscape becomes more competitive, companies will increasingly see remote work and the flexibility it offers as advantages for both them and their employees.
The modern technological era is one where organizations are continuously threatened by online hackers. These threat actors have become more intelligent, and by using a combination of new tools, old tricks, and perseverance, they remain adept at breaking through increasingly secure endpoints.
The holidays are time when we hopefully get to slow down and spend some quality time with family and friends, enjoy wonderful food, and of course, shop like crazy for all the deeply discounted gadgets and connected devices. Despite our deeply ingrained desire to give the coolest gifts, the headlines detailing major cybersecurity incidents involving […]
A data breach poses a severe threat to any company, whether it’s still developing or fairly established in the industry. Anyone can be the target of hackers—especially those companies who don’t take the necessary measures to protect their assets. Unfortunately, you can’t unscramble an egg: once a data breach happens, your company is compromised. However, […]
The University of Rochester Medical Center (URMC) agreed to pay $3 million to the U.S. Department of Health and Human Services (HHS) and take substantial corrective action to settle alleged violations of the Health Insurance Portability and Accountability Act (HIPAA) privacy and security rules, HHS announced November 5.
Have you heard the news? VPNs are dead, apparently. It’s happened. One of the most iconic and widely-used tools is, according to some, fading from use. Just don’t tell my team at OpenVPN — based on our business, we certainly couldn’t tell.
Congratulations on your decision to become payment card industry (PCI)-compliant! There’s no time like the present to solve cybersecurity-related business concerns while improving your data infrastructure and process management at the same time. In the competition to keep bad guys away from your business’s (and your customers’) sensitive data, PCI compliance is a popular, well-known […]
In an increasingly perilous web environment, server-level security is an imperative. Your server and IT infrastructure are vulnerable to numerous threats on the web, and thus, comprehensive security is a must.