Jill Sullivan

Recent Posts

Top 5 Benefits of Cloud Services for Educational Institutions

Posted by Jill Sullivan on Aug 20, 2019 1:04:10 PM

Cloud computing, once used primarily in technology and technology-related businesses, has been increasingly adopted by businesses in non-technology related fields. In fact,one of the sectors that has seen a huge growth in cloud computing adoption over the past several years is education. Educational institutions are rapidly ditching traditional classroom-based learning systems in favor of cloud-based systems and strategies. It is estimated that between 2017 and 2021, the cloud computing market in education will grow at a Compound Annual Growth Rate (CAGR) of at least 26%.

Read More

Security as a Service (SECaaS): Implementation Guidance

Posted by Jill Sullivan on Aug 7, 2019 10:30:00 AM

The prevalence of cybercrime has steadily increased over the past several years as people and businesses conduct their transactions over the internet. It is projected that the global cost of cybercrime will reach $6 trillion by 2021. As hackers and other malicious actors develop more sophisticated and advanced tools to conduct their cybercriminal activities, businesses have struggled to keep their networks protected, with varying degrees of success. One of the most recent victims of cybercrime is Capital One. A hacker was able to exploit an account misconfiguration and compromise the accounts of over 106 million individuals.

Read More

5 Technology Attack Vectors to Watch For

Posted by Jill Sullivan on Jul 30, 2019 9:00:00 AM

With the internet now an indispensable aspect of the lives of most people, cybersecurity can no longer be considered an afterthought. On a daily basis, people conduct financial transactions as well as exchange their private information over the internet. This trove of data exchanged has become a target for cybercriminals who devote their time and resources devising ways to access and exploit sensitive data. With recent reports revealing that the average cost of a cyber attack is over $1 million, it is essential to make sure that your business is fully protected from any form of cyber threat.

Read More

Topics: Malware, Cyber Security

10 Types of Network Security Attacks

Posted by Jill Sullivan on Jul 17, 2019 9:00:00 AM

Due to increased public awareness about the importance of keeping online transactions and documents secure, cybercriminals have modified their network attack strategies. Technological advances over the past several years have enabled these cybercriminals to develop more innovative, as well as stealthy, ways to attack computer networks.

Read More

Topics: SECaaS, Cyber Security, Network security

What Are User Entity Behavior Analytics, and Why Are They Important?

Posted by Jill Sullivan on Jun 18, 2019 9:30:00 AM

As businesses increasingly conduct more of their activities online, there has been a corresponding increase in the frequency as well as the number of cyber attacks; cybercriminals invest their time and resources seeking various ways to compromise business computer networks. Given the increased frequency and sophistication of cyber attacks, traditional cybersecurity strategies are no longer enough in keeping your computer network secure. 

Read More

Topics: SIEM, UEBA

Creating a Disaster Recovery Plan for Healthcare Organizations

Posted by Jill Sullivan on Jun 12, 2019 7:30:00 AM
Over the past several years, physicians and other ancillary healthcare workers have shifted away from paper documentation to the use of electronic medical records (EMRs). The establishment of the Medicare and Medicaid Incentive Programs (now called the Promoting Interoperability Programs) by the Centers for Medicare and Medicaid Services in 2011 has further served to hasten this transition. Under this program, providers and eligible health facilities receive federal payments for their adoption and utilization of electronic health systems.

With this increase in medical data being stored electronically, it is essential to have a disaster recovery plan in place to ensure that your healthcare facility can still function if its data is lost or corrupted. An effective disaster recovery plan lets you restore your medical data and resume normal processes with minimal downtime following any type of data loss. Without a disaster recovery plan, your business may have a delayed recovery or even fail following any type of significant data loss.

Read More

Topics: DRaaS, healthcare

The Top 5 Benefits of SOC as a Service

Posted by Jill Sullivan on Jun 6, 2019 7:30:00 AM

Cybersecurity, once considered an afterthought, plays an important role in the ultimate success or failure of most organizations. This is especially the case for businesses that have a strong digital presence and conducts some, if not the majority, of their transactions online. With cybercriminals constantly looking for new and innovative ways to compromise business networks, it is essential to have an updated cybersecurity strategy to ensure that your network remains protected. Failing to have an effective cybersecurity strategy in place can be costly for impacted businesses; in 2018, the global average cost of a data breach was $3.86 million which was a 4.8 percent increase from the previous year.

Read More

Topics: SECaaS

7 of the Most Common Phishing Attacks and How to Protect Against Them

Posted by Jill Sullivan on May 15, 2019 7:30:00 AM

With internet access and availability having increased significantly over the past few years, more people now conduct their transactions online. Knowing this, cybercriminals spend considerable amounts of time and money looking for ways to access private personal information or confidential business information for nefarious reasons. Of the many techniques used by cybercriminals to obtain private and confidential information, one of the most endemic is phishing.

Read More

Topics: Cyber Security, email security, phishing, vishing, smishing, pharming

10 Cybersecurity Tips for Small Businesses

Posted by Jill Sullivan on May 7, 2019 9:23:02 AM

Over the past several years, there has been a significant increase in the frequency as well as the severity of data breaches. In 2018, ransomware attacks increased by 350%, spoofing increased by 250%, and spear-phishing increased by 70% overall. Furthermore, the average total cost of a data breach for an individual company increased from $3.62 to $3.86 million, an increase of 6.4%.

Read More

Topics: Data Protection, Cyber Security

    Subscribe to our Blog!

    New Call-to-action

    Recent Posts

    Posts by Tag

    See all