Remote workers losing laptops are bigger threat to companies than hackers
| | | | | | | | | | | | | | | | | | | | |

Remote workers losing laptops are bigger threat to companies than hackers

Laptops lost by remote workers returning to the office are a bigger financial threat to British industry than ransomware hackers, according to new figures. Data assembled by Cisco Systems shows that businesses were fined a total of £26m after employees mislaid their work-issued laptops and … See all articles in Insights

9 VOIP security best practices to consider for your business
| | | | | | | | | | | | | | | | | | | | |

9 VOIP security best practices to consider for your business

Is VOIP secure? Can VOIP be hacked? Learn about why VOIP security is important and the best practices for your business to consider with our … See all articles in Insights

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
| | | | | | | | | | | | | | | | | | | | |

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident

Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT … See all articles in Insights

Security Leaders Share 5 Steps to Strengthen Cyber Resilience
| | | | | | | | | | | | | | | | | | | | | |

Security Leaders Share 5 Steps to Strengthen Cyber Resilience

These aren’t quick fixes, but by prioritizing needs based on risk, organizations can incrementally apply these steps to become more resilient. See all articles in Insights

What is a Data Breach and How to Prevent It
| | | | | | | | | | | | | | | | | | | | |

What is a Data Breach and How to Prevent It

A data breach is a cybersecurity incident where someone accesses a system to view or copy sensitive or private information without authorization. … See all articles in Insights

Why you’re getting cloud security wrong
| | | | | | | | | | | | | | | | | | | | | |

Why you’re getting cloud security wrong

The Cloud Security Alliance, in partnership with security company BigID, released the results of a survey of 1,500 IT and security professionals. … See all articles in Insights

It’s time to prioritize SaaS security
| | | | | | | | | | | | | | | | | | | | |

It’s time to prioritize SaaS security

We’ve made a point of shoring up security for infrastructure-as-a-service clouds since they are so complex and have so many moving parts. … See all articles in Insights

Cybersecurity Outsourcing: Principles of Choice and Trust
| | | | | | | | | | | | | | | | | | | | |

Cybersecurity Outsourcing: Principles of Choice and Trust

A few years ago, cybersecurity outsourcing was perceived as something inorganic and often restrained. Today, cybersecurity outsourcing is still a rare phenomenon. Instead, many companies prefer to take care of security issues themselves. Almost everyone has heard about cybersecurity outsourcing, but … See all articles in Insights

FBI warns hackers are targeting K-12 schools and potentially your student’s personal data
| | | | | | | | | | | | | | | | | | | | |

FBI warns hackers are targeting K-12 schools and potentially your student’s personal data

The federal government warns that K-12 schools are facing a growing threat from cyberhackers.According to the FBI, those school districts often have … See all articles in Insights

How Penetration Testing can help prevent Ransomware Attacks
| | | | | | | | | | | | | | | | | | | | |

How Penetration Testing can help prevent Ransomware Attacks

Penetration testing is an essential part of finding and recognizing possible critical vulnerabilities within your organization’s external network, … See all articles in Insights