cybersecurity
A New Age of Threats in Online Shopping: Cybersecurity Tips
The rise in online shopping brings more than just the ease of overnight shipping and competitive pricing – it also gives hackers more opportunities to take advantage of financial and personal information. According to Veriff, there was a 40% increase in identity fraud in 2023 compared to 2022. Payment industries also saw a 54% increase […]
Securing Our Water Supply: Cybersecurity Strategies for Treatment Plants
The recent cyberattacks affecting water treatment plants and systems across the nation shed light on the need for cybersecurity measures that safeguard these essential services. In fact, the Environmental Protection Agency found that about 70% of utilities inspected by federal officers over the last year violated standards meant to prevent cybersecurity breaches. With government entities […]
SME Cybersecurity Challenges and Opportunities
Small and Medium Size Enterprises (SMEs) are a major driver of the U.S. economy, representing as much as one-third of the private sector GDP. However, from a cybersecurity perspective, these organizations are at a disadvantage. Cybersecurity is typically handled by a company’s IT staff, who become quickly overwhelmed by the complexity and operational workload of […]
Cybersecurity Leader SonicWall Rides Wave of Momentum with Company Transformation, Acquisitions, and New Cyber Platform
Outside-In Approach to Partners Key to Firm’s Continued Growth Welcome to the new SonicWall! 2024 marks a high note in the transformation of SonicWall, which was founded in 1991 as Sonic Systems, shipping Ethernet cards for NuBus and SE expansion slots. Now, over thirty years later, SonicWall is serving the needs of well over 500,000 […]
Better Protect Your Cybersecurity During Hurricane Season
Threat actors don’t just seek out security weaknesses. They look for situational vulnerabilities. Every holiday season, for instance, they come out of the woodwork to capitalize on the seasonal surge of retail transactions. Just as malicious actors use peak retail activity as a moment to attack, they also use the chaos wrought by natural disasters […]
Understanding the Vital Role of Indicators of Compromise (IOCs) in Cybersecurity
In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. One crucial tool in the arsenal of cybersecurity professionals is Indicators of Compromise (IOCs). These IOCs serve as early warning signs, enabling organizations to detect and respond to cyber threats swiftly and effectively. Let’s delve deeper into why IOCs are essential for cybersecurity. […]
Excellence in the essentials of cybersecurity – below the ‘poverty line’
By Maurice Uenuma, VP & GM Americas at Blancco Technology Group The ‘cybersecurity poverty line’ was a term coined over ten years ago by a Cisco security leader, Wendy Nather. We often hear it described as the resource “threshold” for adequate cyber protection. The companies beneath the line lack the budget, resources and skills to […]
Leveraging Data Consolidation to Strengthen Cybersecurity: A Comprehensive Approach
In today’s interconnected digital landscape, cybersecurity has become a paramount concern for organizations of all sizes and industries. With cyber threats evolving in sophistication and frequency, businesses are constantly seeking innovative strategies to fortify their defenses and safeguard sensitive information. One such strategy gaining prominence is data consolidation – a proactive approach that consolidates diverse […]
Deepfakes turn into second most common cybersecurity incident
Deepfakes, where AI algorithms manipulate a person’s voice, image, or video to mimic the original, have emerged as the second most common cybersecurity threat in the UK, closely trailing malware. Surprisingly, an alarming 32% of businesses in Britain have fallen victim to such incidents within the past year, according to a recent online survey conducted […]
Mastering the Cybersecurity Tightrope: Risks and Threats in Modern Organizations
Organizations of all sizes grapple with the daunting reality of potential vulnerabilities, malicious actors, and unforeseen challenges that threaten the integrity of their company. The stakes have never been higher; from small startups to multinational corporations, every entity must navigate an intricate web of security challenges daily. While the terms—’risk’ and ‘threat’—are often intertwined in […]