The Year of So Many Things – Including Cybersecurity
Wondering how bad this year has been for cybersecurity? Answer: Disastrous. We recap what amounts to the worst year on record for cybersecurity.
Endpoint Device Protections Escalating in Importance
The coronavirus pandemic is accelerating the need for more-effective endpoint security measures as the new work-from-home society threatens corporate networks.
A Paradox of Cybersecurity
If the USB port is the front door to your data networks, then the unassuming USB flash drive is the lock, key, and knob all in one. The cybsersecurity paradox created by the unassuming USB flash drive is one we all should be aware of.
The Security Risks of USB Flash Drives
With the ease of data transportability provided by a USB flash drive comes the ease with which a data breach can occur. Are you at risk?
Why You Should Implement Zero Trust Security
Zero Trust Security is more important than ever, as the number of cyber attacks has exploded since the onset of the coronavirus pandemic.
Odds are Your Cybersecurity Breach Will Begin on an Endpoint
According to a recent cybersecurity study, "70% of successful breaches originate on the endpoint.” That risk is now escalating.
The Rise of Cyberattacks in the Age of COVID-19
The global pandemic, it turns out, is not just one of human health; cyber health is also at stake, as the number of cyberattacks has exploded since February.
The Cybersecurity Risks of Portable Media
In this new work-from-home era created by a global pandemic, the cybersecurity dangers associated with portable media are growing exponentially.
The Growing Problem of Insider Cybersecurity Threats – and How to Stop Them
The focus on external cyber attacks has caused us to overlook – and prevent – potential insider threats created by employees, contractors, and other associates.
Malice in a Pocket: What the Department of Energy Recently Learned
Data breaches related to USB drives and other peripheral devices are on the rise. In fact, insider threats are one of the leading cause of data breaches.
What’s Missing from Today’s Cyber Hygiene Programs?
If nearly half of all data breaches are physical breaches, not cloud-based breaches, then doesn’t it make sense to include physical security in any cyber hygiene policy? Of course it does.
How to Prevent Nearly Half of All Data Exfiltration Events
We wonder why there is so much being spent in an attempt to stop remote hackers, yet we still leave our ubiquitous computer and network ports wide open.