Seven Uncomfortable Truths About The State of Cybersecurity

Sophos released their state of cybersecurity study and the findings are clear – companies are not equipped to handle cybersecurity threats. The study, published last week, surveyed over 3,000 IT managers at companies around the world about their cybersecurity experiences, concerns and future plans. From their responses, the study’s authors identified seven key facts about cybersecurity, all of which point to the need for companies to focus more heavily on the issue. Here are the crucial takeaways companies need to understand about digital security moving forward:   Cyberattacks are now the norm, not the exception. Of all organizations surveyed, 68 percent reported being victims of a cyberattack last year, with…

Identify Phishing Emails With These Tips

Phishing scams — emails designed to induce people to reveal personal information — are becoming increasingly common and dangerous. As technology evolves, scammers are capable of creating more targeted and sophisticated attacks. Accounting Web recently reported that hackers are now even utilizing artificial intelligence to make their frauds seem more believable. With increased risks comes the need for greater prevention efforts. Follow these tips to keep you and your company safe:   Consider the source. Who is the sender? Is it someone you recognize and have been in contact with before? If not, you’ll want to proceed with caution. Check the “to” and “from” addresses. If the message is addressed to…

United States Law Firms Targeted by Foreign Nation-State Hackers

It’s not only the government that’s at risk for cyber attacks from foreign nation-states — almost anyone with a large amount of valuable data can be a target. In the United States, foreign hackers often target law firms in particular. According to Priscilla Moriuchi, director of strategic threat management at Recorded Future, “[Law firms] are such a great target because they have access to a good deal of non-public information.” Breach Attempts to Date A high-profile example of a law firm breach is DLA Piper, an international law firm that was brought down in a matter of minutes in an overnight breach, according to Bigger Law Firm. Due to an…

How Artificial Intelligence Will Impact Cybersecurity

Cybersecurity is sometimes seen as a disaster recovery operation — a situation to be dealt with when it happens. Someone breaks in, and then the company reacts figure out who, what, when, where and how. However, the best way to approach this kind of situation isn’t to sit back and wait for it to happen — it’s to prevent it from occurring in the first place. What if there was a way to know that a breach was about to happen, or if constant monitoring of your system found a hole instead of a hacker finding it? In the near future, this may become a reality thanks to artificial intelligence.…

City Governments Paying Big For Cybersecurity Breaches

Cities, municipalities and government bodies alike have all been targets of cyber attacks, usually in the form of ransomware that gets in via poor employee cyber practice. According to Security Boulevard, in the past year, Ontario’s Municipal Offices and the Town of Wasaga Beach in Ontario were attacked, leaving their servers useless. A hit closer to home was the big breach in Atlanta that ended with the city opting to spend funds on incident response instead of paying the ransom. In the end, a breach in the system can end up costing the entity thousands, if not millions, of dollars, which leaves other government agencies with the question: how do…

Small Businesses Are A Big Target For Cyber Criminals

Small businesses may not seem like an ideal target for criminals looking to make big bucks. However, since large corporations understand that they are at risk for an attack, many companies invest in a good cybersecurity plan. Unfortunately, this leaves the smaller businesses wide open for hackers who are looking to go after an easy target, and for small businesses, a cyber attack can be devastating. The Threat Small businesses have a hard time keeping up in a world where technology is ever-changing, including ways that hackers are infiltrating vulnerable networks. They may take advantage of a bug in a company’s system or an employee who is careless on their…

Cryptojacking Emerges As Cybersecurity Threat

As technology continues its rapid pace of development, hackers are continuously adjusting their tactics. Such is the case with the latest hacking trend, cryptomining. This newest form of deception gives the hacker the ability to slowly build anonymous cryptocurrency without a command and control link back to the culprit, making them essentially invisible with no way of tracing them. However, there are ways to protect yourself from these malicious attacks, and it starts with getting familiar with what cryptomining actually is.   Cryptomining   Unlike previous forms of hacking, cryptomining allows hackers to operate unnoticed in their victims’ computers. How? Because what they’re stealing isn’t data but your computing power.…

Why Healthcare Organizations Need Strong Cybersecurity

Hospitals and medical practices house a goldmine of valuable patient information for hackers. Personal information such as birthdays, credit card information and medical history are entered into a database after visiting the doctor’s office. For this reason, medical practices are one of the largest targets for data breaches and should uphold strong cybersecurity measures.   Education Cybersecurity starts with the people who use the network most frequently: the employees. If employees are uneducated or not properly trained on cybersecurity procedures in the medical practices, mistakes will be made. For instance, the Utah-based company HealthEquity reported that 23,000 accounts were compromised in a data breach earlier this year. According to SC…

Key Factors to Consider for Enterprise Mobility Development

  From smartphones to cloud networks, it’s not surprising that 63 percent of business enterprises consider mobility the most significant factor in gaining competitive business advantage, according to Mobile Business Insights. And with the global enterprise mobility market estimated to bring in $240 billion in revenue in 2020, companies can’t afford to ignore the mobile arena. Yet new technology and a vast, rapidly expanding digital sphere carry complicated concerns and dangers. Here are three key factors to consider when developing an enterprise mobility strategy. Enterprise-Specific Apps The most recent iteration of enterprise mobility development has seen an explosion in the use of mobile applications — particularly enterprise-specific, cross-platform apps. These…

How Government Agencies Benefit from A Hosted Applications Model

The growth of applications hosted in the cloud creates opportunities and challenges for government agencies that must now deploy and manage a wide portfolio of applications in multi-cloud environments. Learn more we detail why moving applications to the cloud, and assessing the best type of cloud for each application, will go a long way toward helping agencies reduce costs, improve security and operate more efficiently.   Government entities are becoming savvier about moving to the cloud. Rather than taking a one-size-fits-all approach, agencies have come to realize that different kinds of clouds are appropriate for different kinds of applications. According to Nextgov, this is a primary reason for the growth…