Post Image

The 10 Keystones of an Effective Endpoint Security Strategy

Do you know what's on your employees' mobile devices? CyberEdge researchers believe mobile applications are the greatest risk to your company's network. In a 2015 assessment, Veracode found an average of 2,000-plus malicious apps on network mobile devices. The solution isn't necessarily a broad-based ban on personal app usage in the workplace. Rather, it's time for security pros to double down on endpoint security.

Read More
Post Image

7 Reasons Point-of-Sale Data Breaches are a Threat to Every Retailer

Your retail stores can't function without point-of-sale systems, but they're one of the greatest information security vulnerabilities. Recent news reports indicate that a Russian cybercrime collective has successfully targeted five separate providers of point-of-sale software in the past month, affecting "hundreds of thousands" of U.S.-based businesses. Significant point-of-sale breaches in the past twelve months have affected hotel groups, fast food chains, and other major brands.

Read More
Post Image

5 Items Missing From Your Information Security Threat Vulnerability Assessments

Where does your average information security professional spend the majority of their time? If you guessed monitoring or compliance activities, you're unfortunately wrong.

Self-created security vulnerabilities are actually the biggest time commitment for today's security professionals, according to recent CSO research. While 73% believe their organizations are likely to fall victim to attack in the next year, almost a third feel like they are "completely underwater."

Read More
Post Image

5 Facts About File Integrity Monitoring and HIPAA Integrity Controls

The risks of being found noncompliant with HIPAA guidelines are among the most pressing issues for healthcare IT professionals. In the event of a data breach, HIPAA fines can exceed $1.5 million. To compound matters, the Department of Health and Human Services Office for Civil Rights (OCR) has recently begun the second phase of random HIPAA audits, which will involve a combination of both written requests and on-site visits. That means now is the time for organizations to ensure they're compliant with all HIPAA requirements.

Read More
Post Image

Cybercrime, Cybersecurity: Everything Cyber

Though no longer a new idea, the Internet of Things (IoT) is also far from being a mature idea. With predictions listing the total number of active, installed, wireless connected devices doubling from the 16 billion in 2015, the thought of cybercrime and cybersecurity can escape no one. Daily reports showing the latest trends and statistics continue to pour in. The latest reports estimate the global cyber security market to grow to USD 202.36 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 10.6%.

Read More