In response to the increased sophistication and devastating consequences of cyber attacks, businesses have gradually transitioned their cybersecurity strategy away from on-premise security solutions and Managed Security Service Providers (MSSPs) to the Security-as-a-Service (SECaaS) model. With SECaaS, a third-party cloud provider assumes the responsibility for the development and maintenance of a business' cyber-security strategy. In 2015, the worldwide market for SECaaS was at $3.12 billion. This market size is projected to reach $8.52 billion by 2020, at a Compound Annual Growth Rate (CAGR) of 22.2%.
The modern workforce is becoming increasingly mobile. Mobile devices, tablets, and laptops are becoming more powerful and with the imminent arrival of 5G, the amount of computing power performed on a mobile device will surely explode. According to a 2018 survey by Oxford Economics, 80% of IT executives believe that mobile devices are vital to enterprise success.
Cybersecurity is top of mind for IT professionals, especially those working in the healthcare industry. The costs associated with a cyber-attack, like ransomware, malware, and other viruses, has increased since 2017. According to a study performed by Ponemon, in 2018 the cost associated with a data breach for the healthcare industry has been $408 per patient record, up from $308 per patient record the previous year.
Let’s start with Office 365 Backup and Recovery. Most organizations don’t realize that O365 data from Excel, Word, PowerPoint, Outlook and more need to be backed up to the Cloud. From Microsoft Exchange to SharePoint and OneDrive, these files aren’t automatically backed up by Microsoft. Though they are applications accessed via the Cloud, once deleted or lost these files are gone forever unless they had previously been backed up.
Have you tested your network security in the last 3 years? How about within the last year? The last 3 months? It can be argued that network security audits should be performed quarterly at the very least, but the best strategy is having a 24/7/365 network security engineer monitoring your network at all time.
There are simple security measures that we all take that most of us would consider "no brainers". We all know the basics, like locking your computer when you leave your desk, using caution around suspicious emails, changing your password, etc. While we'd all say these small tasks are no brainers, how many of us actually do take these security measures? How many of us actually follow these rules? Studies show that, though people know what they should be doing from security stand points, they don’t.
A Security Operations Center is a facility that houses an information security team. As opposed to a Network Operations Center (NOC) that oversees network management and monitoring, the Security Operations Center (SOC) oversees security systems and processes for an organization. The two do complement each other; one ensures the network is uninterrupted with maximum up-time and the other ensures that the network is protected from all angles.
The traditional train of thought on data security has been tossed out the door thanks to advancements in cloud computing. For a while, it was believed that data and sensitive information was safest if kept in-house, on-premise, and locked up. Your employees managing your own servers, infrastructure, and security software was considered best-practice. Outsourcing security was believed to carry inherent risks and severe consequences. This has changed rapidly thanks to growing trust and security in the cloud.
High profile data breaches and leaks have brought a lot of attention to cyber security of late. With so much information now stored in the cloud, many people are naturally concerned about how to prevent data leaks. Although, in many ways, cloud storage is more secure than traditional on-site storage, there are still concerns. Here are seven good ways to make sure that your cloud data is secure:
We often think of security parameters as “no brainers.” We know the basics – Lock your computer when you leave your desk, don’t open suspicious emails, change your password, etc, etc. But how many of us actually follow these rules? Studies show that, though people know what they should be doing from security stand points, they don’t.
In our company, one of the requirements as an employee is to take regularly scheduled security training, so if you asked me last week, I would say I’m pretty well versed in Cyber Security. I recently read an article that included an online test, however, and I was surprised that I answered questions incorrectly that I thought I absolutely knew the answer. I realized that the reason behind my incorrect answers, once again, are indicators of the biggest cause of cyber security breaches -human error.