Cybersecurity is less about what a business’ IT team does and more about the decision-making process. The growing risks to online security mean that leaders need to make wiser business decisions and rethink strategies that affect cybersecurity. Whether it’s working with contractors, upgrading software, or staying up to date with the latest threats, these are […]
A new International Data Corp. (IDC) survey found that more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell victim to ransomware, it is not uncommon to have experienced multiple ransomware events.
As enterprises respond to the acceleration of remote working, hybrid cloud adoption continues to increase—but security remains a persistent blocker. Marcella Arthur, Vice President of Global Marketing at Unbound Security, looks at how emerging approaches to key management are enabling enterprises to rethink and assert control over their cloud strategies.
The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies, has released a study titled, “2021 Trends in Securing Digital Identities,” based on an online survey of over 500 IT decision makers. The report examines the impact that the […]
With the arrival of hurricane season comes the potential for significant damage, loss of life, and housing and electrical power difficulties for those in their paths. While emergency management officials put most of their efforts toward helping residents, security practitioners still must protect their facilities, before, during, and after hurricanes.
Janitorial crews are often neither seen nor heard, starting their work shifts after most employees have gone home. This level of freedom can cause security problems related to more than just incidents of theft. Workers in these jobs tend to be poorly screened or not backgrounded by the firms who hire them, mostly because the […]
There is no denying the importance of bringing information technology (IT) and physical security personnel together to make sure these two worlds do not collide. A united front is essential when it comes to fighting against the many threats coming from all directions these days.
In an increasingly perilous web environment, server-level security is an imperative. Your server and IT infrastructure are vulnerable to numerous threats on the web, and thus, comprehensive security is a must.
Maintenance on security equipment can get ignored until those devices fail—and often under the worst circumstances. It’s critical to schedule maintenance and stay vigilant for any needed inspections, adjustments, or repairs, even on newly installed equipment.
The orientation process for new employees can be like drinking from a fire hose, with a lot of information—and not all of it completely relevant for them—in a short period. The Security department may play a large or small role in this discussion, and it’s critical that the presenters provide consistent, useful information that the […]