Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

Young woman at a job interview.

Can Technology Help Close Your Organization’s Cybersecurity Talent Gap?

The current job market is hot, and with unemployment at a low, many employers are struggling to attract top talent. While most industries are struggling to recruit the best people, those who are looking for qualified cybersecurity personnel might need to dig deep into their reservoir of patience. Hiring managers tasked with posting cybersecurity jobs […]

shocked man in front of his computer

Web Browser Extensions Responsible for Massive Data Privacy Issue

If employees at your organization use a computer as a part of their day-to-day work, there’s a better than average chance that they spend some of their time using a Web browser. With the advent of enterprise-scale software solutions like Microsoft’s Office365 or Google’s G Suite, many workers must use a browser to get their […]

Software Patch

Still Using Windows 7? Security Updates End in 6 Months

Update: This Saturday (July 20) marks the 6-month countdown until Microsoft kills security updates for its beloved Windows 7 operating system (OS) on January 20, 2020. While many larger enterprises have either completed their migration to Windows 10, or will have finished their migration by that deadline, there are still a large number of organizations […]

Data Breach

Three Things You Should Know If Your Organization Suffers a Data Breach

A data breach poses a severe threat to any company, whether it’s still developing or fairly established in the industry. Anyone can be the target of hackers—especially those companies who don’t take the necessary measures to protect their assets. Unfortunately, you can’t unscramble an egg: once a data breach happens, your company is compromised. However, […]

CISO stands addressing team at board meeting

What Does it Take to be a CISO?

Because our society is teeming with technological innovation and prowess, the role of the Chief Information Security Officer (CISO) is becoming increasingly important for businesses globally. What does it take to work at the executive level in cybersecurity? To determine this, Varonis analyzed data from the CISOs of Fortune 100 companies.

International

Supply Chain Threats Pose Unique Risks, Demand Unique Solutions

As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]

IoT devices in an office

3 Major Security Risks of IoT Devices

The Internet of Things (IoT) has unlocked enormous benefits for users: unlimited remote control over personal items, streamlined experiences, and advanced tracking of personal health data. But, as our lives become increasingly intertwined with our digital devices, we’re exposed to new security risks.

Social Engineering Means Cybersecurity Depends on Human Resources

Some believe that our increasing reliance on technology has lessened the importance of humans in today’s workplace, but just the opposite is true. Although technology can help us work more efficiently, humans remain the central motor that drives all endeavors forward. This means human resources (HR) must play a role in cybersecurity.

IoT Device Control

New NIST Report Provides Advice for IoT Integration

Devices built for the Internet of Things (IoT) are increasingly finding their way onto organizational networks. Even modest predictions estimate more than 20 billion IoT devices (thermostats, cameras, coffee makers, light bulbs, printers, etc…) will be connected to networks across the world by 2020. While these devices provide a good deal of convenience to end […]

Woman holding a security awareness sign.

Does Your Company Disregard Basic Cybersecurity Tasks?

Sensitive data are high-value targets for hackers who will do (and can do) seemingly anything to get them. Large-scale attacks should serve to remind us to stay vigilant and motivate us to employ robust cybersecurity solutions to guard our data. The unfortunate reality is that even the most powerful tech can’t guard against things like […]