Cybersecurity is top of mind for IT professionals, especially those working in the healthcare industry. The costs associated with a cyber-attack, like ransomware, malware, and other viruses, has increased since 2017. According to a study performed by Ponemon, in 2018 the cost associated with a data breach for the healthcare industry has been $408 per patient record, up from $308 per patient record the previous year.
Let’s start with Office 365 Backup and Recovery. Most organizations don’t realize that O365 data from Excel, Word, PowerPoint, Outlook and more need to be backed up to the Cloud. From Microsoft Exchange to SharePoint and OneDrive, these files aren’t automatically backed up by Microsoft. Though they are applications accessed via the Cloud, once deleted or lost these files are gone forever unless they had previously been backed up.
Have you tested your network security in the last 3 years? How about within the last year? The last 3 months? It can be argued that network security audits should be performed quarterly at the very least, but the best strategy is having a 24/7/365 network security engineer monitoring your network at all time.
A Security Operations Center is a facility that houses an information security team. As opposed to a Network Operations Center (NOC) that oversees network management and monitoring, the Security Operations Center (SOC) oversees security systems and processes for an organization. The two do complement each other; one ensures the network is uninterrupted with maximum up-time and the other ensures that the network is protected from all angles.
The traditional train of thought on data security has been tossed out the door thanks to advancements in cloud computing. For a while, it was believed that data and sensitive information was safest if kept in-house, on-premise, and locked up. Your employees managing your own servers, infrastructure, and security software was considered best-practice. Outsourcing security was believed to carry inherent risks and severe consequences. This has changed rapidly thanks to growing trust and security in the cloud.
Financial institutions are quickly learning that the future of banking is in the cloud. To stay competitive, improve security, and provide more diverse service offerings for end users, financial institutions will look to the cloud for solutions. Banks have traditionally been slow to move to the cloud due to security and compliance concerns but as of recent, have begun to fully understand the full potential and benefits of the cloud. Confidence in the cloud has skyrocketed as of recent thanks to improved levels of security and compliance associated with cloud strategy.
Let’s face it, if you haven’t used or heard of the internet, it’s safe to say you live under a rock. About 3.5 billion people accessed the internet last year and that number is growing fast. With internet usage increasing over a number of different devices, so are cybersecurity concerns and headaches for IT professionals. Untrained employees, hackers, and more complex viruses leave business prone to cyber-attacks. Small businesses lack funds to invest in data protection while big businesses have more attackers targeting them.
It’s hard to forget the Equifax breach of 2017 when social security numbers and other sensitive information like credit scores were leaked. From phishing to DOS (denial of service) to fake WANs, the number of resources for hackers has grown in tandem with our access to technology. In short, the Internet of Things (IoT) has created a culture of growing security concerns. Yet still 73% of companies are not prepared for hackers, according to a study by Hiscox insurance. There's no reason not to be prepared in today's environment thanks to the Cloud.
Have you ever been in the position where you are working on a deadline, trying to beat the clock and all of a sudden you are prompted to change your password? Has it been 90 days already! Of course, the prompts that have been coming up for the last few weeks have been dismissed – you tell yourself, “I’ll do it later.” But now it’s do or die. So, you sit… what shall I change my password to this time? I can’t use something I’ve already used – what have I used? So you pull out your list of sticky notes with all your passwords. Wrong, Wrong, Wrong!