A SWAT team breaking down doors. Helicopters circling overhead. Hostage situations are serious business, but they don’t always play out like in the movies. What about ransomware response — when the threat is digital, the victim is data, and your organization’s operations hang in the balance? Ransomware is THE cybersecurity headline for 2023 (and 2022… Continue reading Ransomware Strikes. Now What?
After the past few years of global twists and turns, the highly effective CIO of 2023 is ready for anything! With the pandemic largely in the rearview, and big-picture goals dominating the cybersecurity stage in coming months, now is the time to examine your business practices to cultivate sustainable IT security strategies. IT leaders know… Continue reading The Highly Effective CIO: 5 Dos and Don’ts
From cautionary tales from Twitter to readying for cyber-warfare, 2022 has been an action-packed year in the digital world. The past year has seen cybersecurity’s meteoric rise to relevance, profit, and danger—and as we move into 2023, now is the time to look back for a glimpse forward. The top five trends of the… Continue reading CyberForecast 2023: 5 Telling Trends
On dating websites, users answer profile questions to help you find the perfect match. What are your hobbies? Where do you like to travel? How do you feel about kids? Pretty standard inquiry to help zero in on someone promising. But when it comes to vetting IT assessment vendors, decision-makers struggle with knowing what to ask about,… Continue reading Promising Proposals: 12 RFP Keys
IT security is heading skyward—experts anticipate the global cybersecurity market will increase by $30 billion over the next two years. But while positions in the field are everywhere for tech-savvy applicants, the profession also has a diversity issue: Most of its hires will be white and male. For this profession of securing environments, IT security’s… Continue reading 10 Inclusive Hiring Keys For A More Diverse IT Team
As the western world continues to lead in technology advancements, we see the same with a dark counterpart: ransomware attacks. A report spanning January 2020 to July 2022 indicates half of all globally recognized ransomware attacks aimed at the U.S., with 2,400 cases out of 5,200. While healthcare has been a prolific target for malicious actors, especially over… Continue reading Top Targets: Ransomware’s Favorite Industries
No publicity is bad publicity—until a federal cybersecurity consultant warns of your company’s digital espionage, disinformation campaigns, and willful lack of data protection. All eyes are on Twitter lately, as the social media giant faces allegations of cyber-negligence from their former head of security, Peiter “Mudge” Zatko. For his years and reputation in ethical hacking… Continue reading Data Protection Bombshells: Lessons From A Whistleblower
Like any relationship, contracting with a third party has its risks. No one knows that better than the organizations whose vendors were hit by major breaches in the first half of this year. Take the Healthcare sector, for instance. The U.S. Department of Health and Human Services’ HIPAA Breach Reporting Tool reports: 360+ notable breaches already in 2022,… Continue reading Risky Business: Vendor Vulnerability Update
Ransomware attacks are now occurring every 2 seconds, up from every 14 seconds just three years ago. Not surprisingly, the global cost of ransomware is projected to rise from $20B annually to $265B by 2031. With ransomware, you’re facing the “hostage situation” of the cybercriminal world. Attacks are designed to make you feel helpless and… Continue reading Ransomware Revelations: Stop Attackers In Their Tracks
An ever-expanding digital perimeter. Vulnerable access privileges. The ‘success’ of cybercrime. This recipe has pushed cyber defense to shift faster than ever away from traditionally defined boundaries—both network and human. With business in the cloud, remote offices and workers, the Internet of Things (IoT), mobile and personal devices, and much more, the security landscape has… Continue reading Perimeters & Permissions: Zero Trust Grows Up