7 Key Considerations When It Comes to Security as a Service (SECaaS)

Posted by Sydney Boman on Jan 16, 2019 8:22:00 AM

In response to the increased sophistication and devastating consequences of cyber attacks, businesses have gradually transitioned their cybersecurity strategy away from on-premise security solutions and Managed Security Service Providers (MSSPs) to the Security-as-a-Service (SECaaS) model. With SECaaS, a third-party cloud provider assumes the responsibility for the development and maintenance of a business' cyber-security strategy. In 2015, the worldwide market for SECaaS was at $3.12 billion. This market size is projected to reach $8.52 billion by 2020, at a Compound Annual Growth Rate (CAGR) of 22.2%.

Read More

Topics: cybersecurity, Cyber Security, SECaaS, Security as a Service, Cloud Security

5 Tips for Mobile Device Security

Posted by Matthew Fall on Jan 8, 2019 8:20:00 AM

The modern workforce is becoming increasingly mobile. Mobile devices, tablets, and laptops are becoming more powerful and with the imminent arrival of 5G, the amount of computing power performed on a mobile device will surely explode. According to a 2018 survey by Oxford Economics80% of IT executives believe that mobile devices are vital to enterprise success.  

Read More

Topics: cybersecurity, Cloud Security

The Cost of Cyber-Attacks in Healthcare

Posted by Matthew Fall on Nov 28, 2018 10:07:00 AM

Cybersecurity is top of mind for IT professionals, especially those working in the healthcare industry. The costs associated with a cyber-attack, like ransomware, malware, and other viruses, has increased since 2017. According to a study performed by Ponemon, in 2018 the cost associated with a data breach for the healthcare industry has been $408 per patient record, up from $308 per patient record the previous year 

Read More

Topics: Cyber Security, Ransomware, Security, Cloud Security, Security as a Service

How SECaaS can Supplement Office 365 Backups

Posted by Matthew Fall on Nov 15, 2018 9:00:00 AM

Let’s start with Office 365 Backup and Recovery. Most organizations don’t realize that O365 data from Excel, Word, PowerPoint, Outlook and more need to be backed up to the Cloud. From Microsoft Exchange to SharePoint and OneDrive, these files aren’t automatically backed up by Microsoft. Though they are applications accessed via the Cloud, once deleted or lost these files are gone forever unless they had previously been backed up. 

Read More

Topics: Cyber Security, Cloud Security, Security, SECaaS

Why Network Audits Should Not Be Overlooked

Posted by Matthew Fall on Nov 13, 2018 10:27:00 AM

Have you tested your network security in the last 3 years? How about within the last year? The last 3 months? It can be argued that network security audits should be performed quarterly at the very least, but the best strategy is having a 24/7/365 network security engineer monitoring your network at all time.  

Read More

Topics: Cyber Security, Cloud Security, Security, Security as a Service

5 Common Cyber Security Misconceptions

Posted by Matthew Fall on Nov 12, 2018 9:00:00 AM

 There are simple security measures that we all take that most of us would consider "no brainers". We all know the basics, like locking your computer when you leave your desk, using caution around suspicious emails, changing your password, etc. While we'd all say these small tasks are no brainers, how many of us actually do take these security measures? How many of us actually follow these rules? Studies show that, though people know what they should be doing from security stand points, they don’t.

Read More

Topics: Cyber Security, Cloud Security

Security Operations Center - What You Need to Know

Posted by Matthew Fall on Nov 8, 2018 9:36:00 AM

A Security Operations Center is a facility that houses an information security team. As opposed to a Network Operations Center (NOC) that oversees network management and monitoring, the Security Operations Center (SOC) oversees security systems and processes for an organization. The two do complement each other; one ensures the network is uninterrupted with maximum up-time and the other ensures that the network is protected from all angles.

Read More

Topics: Cyber Security, Cloud Security, Security, SECaaS, Security as a Service

How Security as a Service will Change the Way you Think about Security

Posted by Matthew Fall on Oct 24, 2018 9:30:00 AM

The traditional train of thought on data security has been tossed out the door thanks to advancements in cloud computing. For a while, it was believed that data and sensitive information was safest if kept in-house, on-premise, and locked up. Your employees managing your own servers, infrastructure, and security software was considered best-practice. Outsourcing security was believed to carry inherent risks and severe consequences. This has changed rapidly thanks to growing trust and security in the cloud. 

Read More

Topics: Security as a Service, Cyber Security, Security, Cloud Security

7 Ways to Prevent Data Leaks in the Cloud

Posted by Sydney Boman on May 1, 2018 10:48:00 AM

High profile data breaches and leaks have brought a lot of attention to cyber security of late. With so much information now stored in the cloud, many people are naturally concerned about how to prevent data leaks. Although, in many ways, cloud storage is more secure than traditional on-site storage, there are still concerns. Here are seven good ways to make sure that your cloud data is secure:

Read More

Topics: Data Protection, Cloud Solutions, Cloud Security, Cloud Service Providers, Cyber Security

5 Common Cyber Security Misconceptions

Posted by Cindy Lucas on Mar 30, 2017 11:46:56 AM

 

We often think of security parameters as “no brainers.” We know the basics – Lock your computer when you leave your desk, don’t open suspicious emails, change your password, etc, etc. But how many of us actually follow these rules? Studies show that, though people know what they should be doing from security stand points, they don’t.

In our company, one of the requirements as an employee is to take regularly scheduled security training, so if you asked me last week, I would say I’m pretty well versed in Cyber Security.  I recently read an article that included an online test, however, and I was surprised that I answered questions incorrectly that I thought I absolutely knew the answer. I realized that the reason behind my incorrect answers, once again, are indicators of the biggest cause of cyber security breaches -human error. 

Read More

Topics: Cyber Security, Cloud Security

Subscribe to our Blog!

DR Guidebook CTA

Recent Posts

Posts by Tag

See all