72.3% of employees in the US will be “mobile workers” by 2020, according to the international data corporation (IDC). This means your IT team needs to mitigate the risk of mobile devices used for work. You have 3 options: You could allow your employees to bring their own mobile devices to work, AKA “bring your own device,” or BYOD. You could supply mobile devices to your employees through a “choose your own device” plan (CYOD). Or, you could offer a “corporate owned, personally enabled” plan (COPE). Out of those 3 options, there’s only 2 that most companies have to decide between: BYOD vs COPE. That’s because CYOD doesn’t offer the personalization that comes with BYOD or COPE - something modern employees have … [Read more...] about BYOD vs COPE: What You Need to Know Before You Choose One
Blog
5 Best Practices for Insider Threat Detection
“Current employees” were the biggest cause of security incidents in 2015 - surpassing hackers, contractors, and organized crime syndicates, according to a PriceWaterhouseCoopers report. While you work to guard against outside IT security threats like ransomware, it’s easy to forget that the biggest threat to your business could be sitting in the cubicle next to your office. To prevent the “insider threat” from stealing your data, you’ll first have to find out who the insider threat is - a process known as “insider threat detection.” We’ll give you 5 tips for insider threat detection that will help you track, identify, and shut down any current employee who poses a risk to your organization. But before we do that, let’s define … [Read more...] about 5 Best Practices for Insider Threat Detection
Hack Back Pros and Cons: What You Need to Know Before Striking Back
“The likely annual cost to the global economy from cybercrime is more than $400 billion,” according to McAfee’s report, Net Losses: Estimating the Global Cost of Cybercrime. With businesses experiencing such staggering losses worldwide, it’s no wonder some are considering ways to strike back against the cybercriminals who rob them. This is often known as “hacking back,” or a “hack back.” Currently, at least one Congressman wants to make it completely legal. Rep. Tom Graves, a Georgia Republican, has drafted a bill known as The Active Cyber Defense Certainty (ACDC) Act and it would amend the Computer Fraud and Abuse Act, which bans unauthorized access of computers. Graves said in a press release, “This bill is about … [Read more...] about Hack Back Pros and Cons: What You Need to Know Before Striking Back
Advanced Persistent Threat Protection: 7 Ways to Prevent APT Attacks
53% of IT professionals see advanced persistent threat protection as one of the top security issues facing their organization, according to Cloud Adoption Practices & Priorities Survey Report. Surprisingly, only 68% of IT managers know what an advanced persistent threat is, according to the Ponemon Institute. If you don’t know your enemy, you can’t defeat them. Advanced persistent threats are one of the most dangerous enemies attempting to infiltrate your organization. To help you prevent them from overpowering your systems and stealing your data, we’ll show you what an advanced persistent threat is, how it works, and various forms of advanced persistent threat protection you can implement today. What is an Advanced … [Read more...] about Advanced Persistent Threat Protection: 7 Ways to Prevent APT Attacks
How to Make Small Business Network Security Safe in 10 Tips
Even if you run a small business, you’re still vulnerable to cyberattacks from hackers. Companies with 250 employees or less were targeted by hackers 31% of the time in 2012, according to Symantec - which is why you need to optimize your small business network security. Without it, you could lose thousands of dollars or go out of business. To help you keep your business and your data intact, we’ll show you a few tips for maintaining a reliable and secure network. But first, let’s define network security. What is Network Security? Small business network security is the combination of hardware, software, policies, and practices used to protect a company’s network from unauthorized access. Essentially, it’s everything … [Read more...] about How to Make Small Business Network Security Safe in 10 Tips