Tag: CTO

Easy Fixes to Improve Cybersecurity and Avoid a Breach Ignored

When it comes to cybersecurity you can never be 100 percent protected but certain measures can be taken to mitigate the risk, including proper backups, training and updating software. You may think it’s a no brainer but thousands of organizations do not follow these simple guidelines.

What’s Next for Ransomware? Look to the Past

Those who use ransomware to commit cybercrime are always looking for new ways to deploy the attack in order to keep it profitable. So, what’s next? A ransomware expert says that new tactics have their roots in world history.

IT and ‘Intrapreneurship’

Your organization doesn’t have to look outside the company for fresh and innovative ideas. Instead, businesses should foster “intrapreneurship” by encouraging better communication between IT and other departments.

Security Measures to Protect Big Data

By Mary Shacklett With all this talk of “big data” in today’s Advisor, it’s worth remembering that effectively governing big data is only useful if the data are secure. Read on to discover how revisions to security processes can help protect your company’s data so that they can be beneficial to the organization.

2017 Predictions for DevOps

By Christine Parizo Last year was big for DevOps, which saw a lot of container adoption by enterprises and more companies bolstering their offerings in 2016. What can IT leaders expect to be on the horizon for this year? Security improvements, containerization, and consolidation are just a few things to look forward to.

2017 Cybersecurity Predictions

By Sharon Florentine Happy New Year! As we kick off 2017, let’s take a look at what we can expect in cybersecurity in the coming months. As you may have guessed, the news isn’t very good. Cybercrime will most likely continue its upward trend, and IT leaders will have to focus on passwords, privileges, ransomware, […]

Industries Most Affected by Ransomware

By Alison DeNisco There have been several high-profile ransomware attacks on hospitals and other healthcare providers, and indeed certain industries are at greater risk than others. However, the healthcare industry isn’t the field most at risk. If you work in IT in any of these industries, take steps to protect your business.

Cybersecurity Pitfalls of Mergers

By Josh Fruhlinger Mergers and acquisitions (M&As) result in huge transitions for businesses worldwide, and these transitional periods can mean increased vulnerability on cybersecurity fronts. If M&As are on the horizon at your company, take a look at what advice IT leaders and cybersecurity pros have to offer.

How Big Are the Gaps in Your Security?

By Ryan Francis Despite many companies’ commitment to cybersecurity, gaps exist in almost all data protection plans. Do you know where (and just how big) the holes in your security are? Be sure to pay attention to gaps in investment, human behavior, visibility, control, and more.