Which stage is your company in? As far back as 1969, psychologists had identified a series of stages that grief-stricken patients pass through, from Denial to Acceptance, when confronted and forced to deal with an unforeseen tragedy. The same model… Read More ›
Data Security
The Greatest Threat To Cybersecurity
The Greatest Threat to Cybersecurity is . . . . . . the Cybersecurity Industry It’s true…. Read More ›
Ransomware: Here we go again. And again.
When we say “It’s when, not if,” we mean it. GoldenEye, a new strain of the Petya family of ransomware, turned the digital world on its head Tuesday morning after initiating from a cyberattack in Kiev, Ukraine. From there,… Read More ›
Ransomware Stakes Keep Growing
IT officials keep thinking they’ve done all they need to keep Crypto and other ransomware variants at bay. And they keep running into unexpected surprises. Problem is, those surprises cost more than ever. When Cryptolocker ushered in a new… Read More ›
True Security Goes Beyond HIPAA Compliance
Criminals pay ten times more for personal health records than they do for stolen credit cards. The reason? The information contained in a person’s medical file runs so deep that identity theft is markedly easier. Healthcare has proved a lucrative… Read More ›
British Airways Revives Debate on IT Outsourcing
Did Third-Party Tech Team Cause Carrier’s Terrible, Horrible, No Good, Really Bad Weekend? At 9:30 AM local time on Saturday morning, what has been variously described by British Airways as a “power surge” and a “power supply issue” (they’re not… Read More ›
Video: Ransomware Explained
Tech for Execs Executives don’t have time for lengthy explorations of the cybercrime landscape. Most have little tolerance for highly technical explanations of why, after all the money they’ve spent on security appliances, their companies are still at risk. They… Read More ›
Who’s Watching Your Stuff: A Watch Out Wednesday Update
You take $86,000 here, and $86,000 there, and pretty soon you’re talking real money. A recent survey revealed a single cyber-security incident now costs the average American small or medium business $86,500. For Enterprises, the number is nearly ten times… Read More ›
Why a SOC 2 Certification Really Matters
What’s more important to your enjoyment of a good restaurant: A chef who understands how to bring out the subtle characteristics of her ingredients and who combines them in creative and exciting ways, or a chef who graduated from the… Read More ›
Two-Factor Authentication: A Watch Out Wednesdays Backgrounder
Security gurus have long recommended the use of two-factor authentication as a key method of improving the security of your organization’s most critical information. But more than 40 percent of companies continue to run single-authentication environments, in which employees attain… Read More ›