The modern workforce is becoming increasingly mobile. Mobile devices, tablets, and laptops are becoming more powerful and with the imminent arrival of 5G, the amount of computing power performed on a mobile device will surely explode. According to a 2018 survey by Oxford Economics, 80% of IT executives believe that mobile devices are vital to enterprise success.
We often think of security parameters as “no brainers.” We know the basics: lock your computer when you leave your desk, don’t open suspicious emails, change your password, etc. But how many of us actually follow these rules? Studies show that, though people know what they should be doing from security standpoints, they don’t.
Even experts, well versed in cybersecurity, need to stay on top of developing trends in the field. Not doing so could mean the threats being addressed are obsolete, and the real threats are being ignored. This plays into one of the major causes of lost of breaches -- human error.
As cloud grows in popularity, so are the ways businesses leverage cloud technology to meet business needs. In an earlier blog, we discussed the difference between public, private, and hybrid cloud strategies. Now, a fourth type of cloud strategy, multi-cloud, is growing in popularity. Often people confuse multi-cloud and hybrid cloud. At first glance, they seem similar, both deploying multiple environments. But here some of the distinct differences between multi-cloud and hybrid cloud:
As humans, we are constantly weighing the odds of particular events happening, more specifically we identify the likelihood of negative events happening to us as lesser than them happening to someone else. This “that won’t happen to me” attitude is the main reason why we so often take a reactive approach to security. For example, your house gets broken into. From a reactive standpoint, you call the police, go out and buy a security camera, change the locks on your doors, etc. The proactive approach would suggest that you do all of this before the break-in occurs so that you've implemented the cameras, get that guard dog, and change the locks before an incident even occurs. For security issues that pertain to your business and its data, a reactive approach won’t cut it, and will often result in prolonged downtime and unexpected data loss. With security breaches on the rise, the important thing to realize is that it is no longer a matter of IF you will be affected, but when.
What is the Dark Web?
The dark web is a part of the internet that isn’t indexed by search engines, like Google or Bing. You can’t access the dark web by using a regular web browser like Chrome, Firefox, or Safari. Instead, the dark web is accessed via special software, like Tor, where users can maintain anonymity (there are no IP addresses) as they surf the dark web and make exchanges.
The average person uses 5 passwords or less across their entire online profile lifetime. That means you most likely have the same password for your personal computer, your bank app, your email account, and dare I say it, your work computer! If you fall into this category or feel that any of your employees might, consider implementing multi-factor authentication on your organization’s end-point devices and network to ensure it stays safe and secure from hackers.
SIEM- it stands for Security Information & Event Management. SIEM has become a vital part of the security strategy of all growing businesses. By 2021, global spending on SIEM is projected to be at $3.4 billion dollars, and for good reason. We all know the next generation of threats to our society will be waged online, but SIEM is here to help. Breaches are now a matter of when, not if. That’s why the best cyber-security incorporates real-time identification of breeches and instant response using SIEM.
In response to the increased sophistication and devastating consequences of cyber attacks, businesses have gradually transitioned their cybersecurity strategy away from on-premise security solutions and Managed Security Service Providers (MSSPs) to the Security-as-a-Service (SECaaS) model. With SECaaS, a third-party cloud provider assumes the responsibility for the development and maintenance of a business' cyber-security strategy. In 2015, the worldwide market for SECaaS was at $3.12 billion. This market size is projected to reach $8.52 billion by 2020, at a Compound Annual Growth Rate (CAGR) of 22.2%.
Cybersecurity is top of mind for IT professionals, especially those working in the healthcare industry. The costs associated with a cyber-attack, like ransomware, malware, and other viruses, has increased since 2017. According to a study performed by Ponemon, in 2018 the cost associated with a data breach for the healthcare industry has been $408 per patient record, up from $308 per patient record the previous year.
Let’s start with Office 365 Backup and Recovery. Most organizations don’t realize that O365 data from Excel, Word, PowerPoint, Outlook and more need to be backed up to the Cloud. From Microsoft Exchange to SharePoint and OneDrive, these files aren’t automatically backed up by Microsoft. Though they are applications accessed via the Cloud, once deleted or lost these files are gone forever unless they had previously been backed up.