5 Information Security Trends for 2016

By Michelle Drolet . 20 Jan 2016

Online security trends continue to evolve. This year, online extortion will become more prevalent. We also expect that at least one consumer-grade IoT smart device failure will be lethal.  Ransomware will make further inroads, since the majority go unreported. China will drive mobile malware growth to 20M, and cybercrime legislation will take a significant step … Continue reading 5 Information Security Trends for 2016

10 Things I Know About Business Security

By Michelle Drolet . 19 Jan 2016

10. Everything is connected. As the Internet of Things adds more and more devices to our networks, it creates more doors and windows for cyber criminals. Keep them locked. 9. Ransomware is on the rise. If you don’t want to end up paying to access your own data, then make sure that you protect it … Continue reading 10 Things I Know About Business Security

Cyberattack     Hacking    

The Worst Hacks of 2015

By Michelle Drolet . 5 Jan 2016

Hacking and data breaches weren’t just the norm, but they reached far and wide, hitting victims of all kinds, from regular consumers, to government employees, and even children and cheaters. It seemed like no one was spared. The Worst Hacks of 2015…drum roll please! Israel Government Allegedly Hacks Kaspersky Lab The Massive Breach at OPM, … Continue reading The Worst Hacks of 2015

Ransomware Featured on the Today Show

By Michelle Drolet . 4 Jan 2016

A “ransomware” segment was recently on NBC’s  Today featuring our security partner Sophos. To learn more about ransomware. click the thumbnail below:    

Corporate     Cyberattack    

Building malware defenses: Control email, web browsers, and ports

By Michelle Drolet . 4 Jan 2016

Another staple in a series examining the Center for Internet Security’s best practices.   Our last article looked at applying Critical Security Controls 4, 5, and 6 to your organization, covering vulnerability assessment, administrative privileges, and audit logs. Now it’s time to move on to CSCs 7, 8, and 9. Email programs and web browsers … Continue reading Building malware defenses: Control email, web browsers, and ports

Cover your top 7 basic security threats first

By Michelle Drolet . 2 Nov 2015

When it comes to infosec, many of the most core basics are being overlooked. Many of the most obvious areas where security can be tightened up with little effort are being blatantly ignored. Are you doing your level best by covering the basics? Below are seven potential vulnerabilities. Most of these can be tackled without … Continue reading Cover your top 7 basic security threats first

Cyberattack    

Don’t be mad at ransomware attackers, be grateful

By Michelle Drolet . 7 Jul 2015

Falling victim to a ransomware attack is most definitely inconvenient, but it could also serve as a wake-up call to the importance of backing up important data.   You’re minding your own business, sitting at your office computer. Suddenly, a pop-up appears – with the logo of the FBI – warning that you’re under investigation … Continue reading Don’t be mad at ransomware attackers, be grateful

Cyberattack    

Positive signs for the future of cybersecurity

By Michelle Drolet . 27 May 2015

For all the infosec hurdles to overcome, we can build a bright future if the enterprise can pull together.   We often talk about the enormous challenges facing IT departments around the world. The consumerization of IT, driven by the BYOD trend and coupled with mobility, has given birth to a wide range of serious … Continue reading Positive signs for the future of cybersecurity

Cyberattack    

7 security threats that go ignored too often

By Michelle Drolet . 18 May 2015

From unencrypted email to open Wi-Fi to faulty firewalls, some of the most common security threats could easily give away the entire farm.   More threats emerge for IT departments every year. Cybersecurity is increasingly challenging as attacks get more sophisticated. But many core basics are still being ignored. Verizon’s 2015 Data Breach Investigations Report … Continue reading 7 security threats that go ignored too often

How to keep cybercriminals out of your apps

By Michelle Drolet . 27 Feb 2015

Four ways to implement and maintain security testing.   Cybercriminals had a fantastic time in 2014 – breaching major retailers such as Home Depot and Kmart, major financial institutions (notably JPMorgan Chase), and a slew of smaller companies. Indeed, cybercrimes are growing more common, more costly, and taking longer to resolve. Those are among the key … Continue reading How to keep cybercriminals out of your apps

Tags