Odds are Your Cybersecurity Breach Will Begin on an Endpoint
According to a recent cybersecurity study, "70% of successful breaches originate on the endpoint.” That risk is now escalating.
The Rise of Cyberattacks in the Age of COVID-19
The global pandemic, it turns out, is not just one of human health; cyber health is also at stake, as the number of cyberattacks has exploded since February.
The Cybersecurity Risks of Portable Media
In this new work-from-home era created by a global pandemic, the cybersecurity dangers associated with portable media are growing exponentially.
The Growing Problem of Insider Cybersecurity Threats – and How to Stop Them
The focus on external cyber attacks has caused us to overlook – and prevent – potential insider threats created by employees, contractors, and other associates.
Malice in a Pocket: What the Department of Energy Recently Learned
Data breaches related to USB drives and other peripheral devices are on the rise. In fact, insider threats are one of the leading cause of data breaches.
What’s Missing from Today’s Cyber Hygiene Programs?
If nearly half of all data breaches are physical breaches, not cloud-based breaches, then doesn’t it make sense to include physical security in any cyber hygiene policy? Of course it does.
How to Prevent Nearly Half of All Data Exfiltration Events
We wonder why there is so much being spent in an attempt to stop remote hackers, yet we still leave our ubiquitous computer and network ports wide open.
The Human Factor: Reason #1 to Lock Your Data Ports and Connectors
A comprehensive report of cybersecurity threats entitled, “The Human Factor,” asserted that “people-centered threats define the landscape.”
Get Physical with Cybersecurity
Corporate executives’ approach to cybersecurity is like forgetting about Newtonian physics when we began to learn about the quantum field or focusing on a proliferation of string theories while forgetting that apples fall down.
How PC Security Hazards Exploded – and How to Secure Them
Are we doing enough to protect our ubiquitous open ports, especially when the cost of protecting these ports is so inexpensive?
Sounding the Alarm Against Open USB Ports
Without effective USB port security, every USB port in your data network or information system is an open invitation to malware, ransomware, and viruses.
The Top Security Breaches of 2019 – and What It Means to Us
The sheer variety of data breaches in 2019 causes us to conclude that no sector of the cybersecurity perimeter should remain unguarded.