Remote workers losing laptops are bigger threat to companies than hackers
| | | | | | | | | | | | | | | | | | | | |

Remote workers losing laptops are bigger threat to companies than hackers

Laptops lost by remote workers returning to the office are a bigger financial threat to British industry than ransomware hackers, according to new figures. Data assembled by Cisco Systems shows that businesses were fined a total of £26m after employees mislaid their work-issued laptops and … See all articles in Insights

Here are all the mistakes your business is making in cloud security
| | | | | | | | | | | | | | | | | | | |

Here are all the mistakes your business is making in cloud security

And why the cost of living crisis could make it harder for you to clean up your act. Imagine a safety deposit box, nestled inside a wall of identical … See all articles in Insights

Enterprises Pay $1,200 Per Employee Annually to Fight Cyberattacks Against Cloud Collab Apps
| | | | | | | | | | | | | | | | | | | | |

Enterprises Pay $1,200 Per Employee Annually to Fight Cyberattacks Against Cloud Collab Apps

Orgs are in the middle of a rapid increase in the use of new collaboration tools to serve the needs of an increasingly dispersed workforce — and … See all articles in Insights

9 VOIP security best practices to consider for your business
| | | | | | | | | | | | | | | | | | | | |

9 VOIP security best practices to consider for your business

Is VOIP secure? Can VOIP be hacked? Learn about why VOIP security is important and the best practices for your business to consider with our … See all articles in Insights

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
| | | | | | | | | | | | | | | | | | | | |

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident

Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT … See all articles in Insights

Password-based hacks have increased 74% over the last year
| | | | | | | | | | | | | | | | | | | | |

Password-based hacks have increased 74% over the last year

In brief: Today’s cybercriminals use a slew of methods to compromise systems, but the most tried-and-tested way is still a favorite: stealing … See all articles in Insights

Cybersecurity recovery is a process that starts long before a cyberattack occurs – Help Net Security
| | | | | | | | | | | | | | | | | | | |

Cybersecurity recovery is a process that starts long before a cyberattack occurs – Help Net Security

While most organizations have insurance in case of cyberattacks, the premium they pay depends on how the business identifies, detects and responds to … See all articles in Insights

Security Leaders Share 5 Steps to Strengthen Cyber Resilience
| | | | | | | | | | | | | | | | | | | | | |

Security Leaders Share 5 Steps to Strengthen Cyber Resilience

These aren’t quick fixes, but by prioritizing needs based on risk, organizations can incrementally apply these steps to become more resilient. See all articles in Insights

Where do business continuity plans fit in a ransomware attack?
| | | | | | | | | | | | | | | | | | | | |

Where do business continuity plans fit in a ransomware attack?

Recovery isn’t the only priority when ransomware hits. Careful planning, training and coordination among IT teams are critical to maintain business … See all articles in Insights

Hospital ransomware attacks putting patients at risk
| | | | | | | | | | | | | | | | | | | | |

Hospital ransomware attacks putting patients at risk

Ransomware attacks on hospitals are becoming increasingly more common, putting patients and health care providers in dangerous situations. NBC News’ Kevin Collier explains the consequences when hackers target these vulnerable populations. See all articles in Insights