Build Your Information Security Strategy Around These High-Level Themes

Your information security strategy shouldn’t be built around threats like Meltdown and Spectre or ransomware. You need a broader strategy that can cope with general threats rather than [...]


Who’s Accessing Your Systems? The Keys to Strong User Identity Management

Cybersecurity starts with knowing who has access to your systems. Firewalls aren’t enough to keep intruders out. With one study showing 81 percent of breaches rely on stolen or weak [...]


Five Steps to Avoid Becoming a Ransomware Victim

Ransomware is becoming a much more common threat that businesses need to defend against. The risk isn’t just that an employee will click on an email infected with malware. Some newer [...]


Defend Against The Important Threats With A Focused Cybersecurity Strategy

The number of cybersecurity threats is almost infinite. One report says that 360,000 new pieces of malware were detected every day last year; others put the daily new malware tally as high as [...]


Recent Incidents Highlight the Importance of Robust Cybersecurity Practices for Municipalities

Several recent events emphasize how important it is for municipalities to protect their computer systems against attacks. In Atlanta, nearly all city services were impacted by a ransomware [...]


Don’t Rely On Your Legacy Cybersecurity Solutions to Protect Today’s Systems

Information security threats don’t ever stop. Besides the risk of malware that steals data and ransomware that locks up your machines, today’s cybersecurity risks include having your [...]


Keep Students and Employees Safe at School with Cyber Security

There’s valuable data in schools. That’s why education is one of the top targets for hackers, with schools experiencing even more attacks than retailers. In fact, the number of [...]


More About Meltdown and Spectre

It’s been over a month since the Meltdown and Spectre vulnerabilities were reported. These hardware-based issues are among the most challenging that the industry’s had to deal with, [...]


Protecting Your Systems Against Meltdown and Spectre

There are some security threats you don’t need to worry about. They apply to different products, different versions, or different operating systems. But there’s no avoiding the two [...]


Don’t Let Your Network Security Tools Undermine Your Network Security

Information security is so important we layer tools on top of tools, hoping they work together and offer increased protection of our data. Often, that works. But sometimes the increased [...]