Cyber Security

Home/Posts/Cyber Security

How AI-Powered Malware Will Alter the Threat Landscape in 2020

By |2019-12-30T18:05:27+00:00December 30th, 2019|Artificial Intelligence, Cyber Security, IT Security, Security|

Cybersecurity has always been a cat-and-mouse game, with malicious actors and security professionals continually refining their tactics to stay one step ahead of the other. Artificial intelligence (AI) is fundamentally changing the game. While IT organizations are using AI to augment security, cybercriminals are also leveraging the technology to find new ways around defense mechanisms. [...]

5 Tips for Averting Holiday Cyber Scams that Could Impact Your Business

By |2019-11-27T19:33:38+00:00November 27th, 2019|Cyber Security, Internet Security, IT Security, Security|

It’s the most wonderful time of the year — for cybercriminals. We’ve entered the peak season for cybercrime, with various studies indicating that cyberattacks increase by up to 60 percent during the holidays. The Department of Homeland Security recently warned of an expected spike in a range of malicious activity, including unsolicited emails that contain [...]

Employees: First Line of Cyber Defense or Serious Security Threat?

By |2019-10-29T18:45:52+00:00October 29th, 2019|Cyber Security, Internet Security, IT Security, Security|

Many organizations rely upon their employees prevent cybersecurity breaches. Employees are advised not to click on unknown links and attachments, share their user credentials, or use unapproved applications and services. And for the most part this strategy works — in a recent study conducted by Sapio Research, 79 percent of information security leaders said that [...]

Balancing IT Innovation with Cybersecurity Readiness in the Budgeting Process

By |2019-10-22T17:30:59+00:00October 22nd, 2019|Cyber Security|

In our last post, we discussed ways to improve the IT budgeting process in 2020 and beyond. Rather than simply allocating a percentage of revenue to IT, organizations should consider ways that IT can add value to the business. The right IT investments can increase profitability, improve productivity, reduce risk, and enable innovative solutions and [...]

Modern NAC Solutions Deliver Effective Threat Defense

By |2019-09-24T19:08:16+00:00September 24th, 2019|Cyber Security, IT Security, Security|

Data breaches are on pace to reach an all-time this year, and the rising frequency of these incidents is driving organizations to increase spending on IT security measures. Gartner analysts predict worldwide spending on IT security will reach $124 billion this year. Network access control (NAC) technologies rank among the top spending priorities. NAC technologies [...]

You Need More than Technology to Protect Personally Identifiable Information

By |2019-07-30T18:33:56+00:00July 30th, 2019|Cyber Security, Internet Security, IT Security, Security|

Personally identifiable information (PII) is the holy grail when it comes to cybercrime. Hackers know PII can be sold easily on the dark web or used to commit identity theft. Healthcare and tax-related information is particularly valuable as it enables criminals to commit fraud over a long period of time without getting caught. While more [...]

How to Get Executive Support Behind Cybersecurity

By |2019-06-12T03:25:34+00:00June 12th, 2019|Cyber Security, Internet Security, IT budgeting and planning, IT Management, IT Security, Security|

In a recent study conducted by MSI-ACI Europe, 61 percent of IT professionals said senior executives expect more lenient security policies for themselves than everyone else. For 65 percent of study participants, that leniency resulted in more data breaches. The obvious question is, shouldn’t it be the other way around? Given the increasingly perilous threat [...]

Why Standardization Is Critical to Effective IT Operations and Security

By |2019-05-14T20:40:20+00:00May 14th, 2019|Cyber Security, Internet Security, IT budgeting and planning, IT Management, IT Security, IT Services, Security|

When you’re constantly scrambling to keep the lights on and serve customers, it can seem expedient to make a user happy by changing a configuration, installing a new application, or adding a new device or service that the user requested. This may put out the fire of the moment, but it can also make your [...]

Windows Server 2008 End of Support is Near. Here Are Your Upgrade Options.

By |2019-04-02T21:25:35+00:00April 2nd, 2019|Cyber Security, Internet Security, IT Security, Security|

Windows Server 2008 has enjoyed a 12-year run, but after multiple extensions, Microsoft will officially cut off support on January 14, 2020. Windows Server 2008 R2, which is just one year younger, will also reach end of support on that date. It should be quite the retirement party with the Windows 7 desktop operating system reaching [...]

Why Steganography-Based Attacks Are on the Rise and What You Can Do about Them

By |2019-03-06T19:27:17+00:00March 6th, 2019|Cyber Security, Internet Security, IT Security, Security|

In January, an image-based malware threat that targets Mac users was discovered. The malware campaign, called VeryMal, uses malicious payloads embedded in ad images, which are delivered through an ad-serving domain. The URL added to the image attempts to trick Mac users into installing a fake Adobe Flash update. When installed, the user contributes to [...]