Here are all the mistakes your business is making in cloud security
| | | | | | | | | | | | | | | | | | | |

Here are all the mistakes your business is making in cloud security

And why the cost of living crisis could make it harder for you to clean up your act. Imagine a safety deposit box, nestled inside a wall of identical … See all articles in Insights

Enterprises Pay $1,200 Per Employee Annually to Fight Cyberattacks Against Cloud Collab Apps
| | | | | | | | | | | | | | | | | | | | |

Enterprises Pay $1,200 Per Employee Annually to Fight Cyberattacks Against Cloud Collab Apps

Orgs are in the middle of a rapid increase in the use of new collaboration tools to serve the needs of an increasingly dispersed workforce — and … See all articles in Insights

9 VOIP security best practices to consider for your business
| | | | | | | | | | | | | | | | | | | | |

9 VOIP security best practices to consider for your business

Is VOIP secure? Can VOIP be hacked? Learn about why VOIP security is important and the best practices for your business to consider with our … See all articles in Insights

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
| | | | | | | | | | | | | | | | | | | | |

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident

Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT … See all articles in Insights

How industrial IoT is forcing IT to rethink networks
| | | | | | | | | | | | | | | | | | | | |

How industrial IoT is forcing IT to rethink networks

Industrial IoT is forcing more networks to the edge and away from central data centers. This is what IT should do now. Network topology has been … See all articles in Insights

Password-based hacks have increased 74% over the last year
| | | | | | | | | | | | | | | | | | | | |

Password-based hacks have increased 74% over the last year

In brief: Today’s cybercriminals use a slew of methods to compromise systems, but the most tried-and-tested way is still a favorite: stealing … See all articles in Insights

Cybersecurity recovery is a process that starts long before a cyberattack occurs – Help Net Security
| | | | | | | | | | | | | | | | | | | |

Cybersecurity recovery is a process that starts long before a cyberattack occurs – Help Net Security

While most organizations have insurance in case of cyberattacks, the premium they pay depends on how the business identifies, detects and responds to … See all articles in Insights

Security Leaders Share 5 Steps to Strengthen Cyber Resilience
| | | | | | | | | | | | | | | | | | | | | |

Security Leaders Share 5 Steps to Strengthen Cyber Resilience

These aren’t quick fixes, but by prioritizing needs based on risk, organizations can incrementally apply these steps to become more resilient. See all articles in Insights

Where do business continuity plans fit in a ransomware attack?
| | | | | | | | | | | | | | | | | | | | |

Where do business continuity plans fit in a ransomware attack?

Recovery isn’t the only priority when ransomware hits. Careful planning, training and coordination among IT teams are critical to maintain business … See all articles in Insights

Hospital ransomware attacks putting patients at risk
| | | | | | | | | | | | | | | | | | | | |

Hospital ransomware attacks putting patients at risk

Ransomware attacks on hospitals are becoming increasingly more common, putting patients and health care providers in dangerous situations. NBC News’ Kevin Collier explains the consequences when hackers target these vulnerable populations. See all articles in Insights