Discussions of cybersecurity (and physical security, for that matter) tend to focus on hardening networks and end points against outside threats. Too often, businesses overlook the internal threats they face. This infographic from Teramind, a cybersecurity company that focuses on insider threat detection, provides key steps to help prevent internal harm to your infrastructure.
Smart cybersecurity practices are more important now, as the lines between our public/private and work/home lives continue to blur. Therefore, it’s increasingly aware about your cyberhygiene, as you’re more likely to carry your bad habits (or good cybersecurity practices) as you transition from role to role. So, no matter where you work – whether it’s at […]
We’re right in the middle of National Cybersecurity Awareness Month, and the good folks at the National Cybersecurity Alliance would like to remind you that there are too few cybersecurity professionals in the workplace. This infographic provides a ton of useful information about the state of the workforce and outlines the broad array of opportunities […]
Today, October 1, is the start of the 15th year of National Cybersecurity Awareness Month, a time when the Department of Homeland Security and the National Cyber Security Alliance work to bring awareness to the ever present issues regarding online safety. This year kicks off with a familiar, but very important theme: Making Your Home […]
As your organization’s dependence on technology grows, the role of the Chief Information Security Officer (CISO) is more important than ever. What does it take to work at the executive-level in cybersecurity? Varonis analyzed data from the CISOs of Fortune 100 companies to get a better sense of what skills these leaders possessed.
With ever increasing pressures from data protection laws such as the EU’s General Data Protection Regulation (GDPR), the looming California Consumer Privacy Act (CCPA), and the data breach laws active in all 50 states, businesses need to focus on baking security into their product design. To do this, many are turning to DevOps as a […]
Cybercriminals are typically looking to make a profit through their efforts, therefore, it’s safe to assume that organizations associated with the global financial sector will always be a target. According to the the 2018 IBM X-Force Threat Intelligence Index, financial services industries have been the most-targeted for the past 2 years. Given the FBI’s recent […]
Smart devices are the new normal, and employees expect that their mobility will carry into the workplace. Having a well-planned, flexible BYOD policy in place is more important than ever. Check out some of the challenges to BYOD programs in this infographic from submitinfographics.com.
As this infographic from Proofpoint demonstrates, there’s a huge cybersecurity visibility gap—and you may not be seeing the biggest threats. View the original infographic here.
External cyberthreats seem to get all the headlines; after all, they’re big and flashy, at times invoking the image of a corporate espionage movie. They are also increasing in scope and severity and since the attackers use constantly evolving methods, the threats require time and attention to properly explain. This often means that while an […]