72.3% of employees in the US will be “mobile workers” by 2020, according to the international data corporation (IDC). This means your IT team needs to mitigate the risk of mobile devices used for work. You have 3 options: You could allow your employees to bring their own mobile devices to work, AKA “bring your own device,” or BYOD. You could supply mobile devices to your employees through a “choose your own device” plan (CYOD). Or, you could offer a “corporate owned, personally enabled” plan (COPE). Out of those 3 options, there’s only 2 that most companies have to decide between: BYOD vs COPE. That’s because CYOD doesn’t offer the personalization that comes with BYOD or COPE - something modern employees have … [Read more...] about BYOD vs COPE: What You Need to Know Before You Choose One
network
Hack Back Pros and Cons: What You Need to Know Before Striking Back
“The likely annual cost to the global economy from cybercrime is more than $400 billion,” according to McAfee’s report, Net Losses: Estimating the Global Cost of Cybercrime. With businesses experiencing such staggering losses worldwide, it’s no wonder some are considering ways to strike back against the cybercriminals who rob them. This is often known as “hacking back,” or a “hack back.” Currently, at least one Congressman wants to make it completely legal. Rep. Tom Graves, a Georgia Republican, has drafted a bill known as The Active Cyber Defense Certainty (ACDC) Act and it would amend the Computer Fraud and Abuse Act, which bans unauthorized access of computers. Graves said in a press release, “This bill is about … [Read more...] about Hack Back Pros and Cons: What You Need to Know Before Striking Back
Advanced Persistent Threat Protection: 7 Ways to Prevent APT Attacks
53% of IT professionals see advanced persistent threat protection as one of the top security issues facing their organization, according to Cloud Adoption Practices & Priorities Survey Report. Surprisingly, only 68% of IT managers know what an advanced persistent threat is, according to the Ponemon Institute. If you don’t know your enemy, you can’t defeat them. Advanced persistent threats are one of the most dangerous enemies attempting to infiltrate your organization. To help you prevent them from overpowering your systems and stealing your data, we’ll show you what an advanced persistent threat is, how it works, and various forms of advanced persistent threat protection you can implement today. What is an Advanced … [Read more...] about Advanced Persistent Threat Protection: 7 Ways to Prevent APT Attacks
How to Make Small Business Network Security Safe in 10 Tips
Even if you run a small business, you’re still vulnerable to cyberattacks from hackers. Companies with 250 employees or less were targeted by hackers 31% of the time in 2012, according to Symantec - which is why you need to optimize your small business network security. Without it, you could lose thousands of dollars or go out of business. To help you keep your business and your data intact, we’ll show you a few tips for maintaining a reliable and secure network. But first, let’s define network security. What is Network Security? Small business network security is the combination of hardware, software, policies, and practices used to protect a company’s network from unauthorized access. Essentially, it’s everything … [Read more...] about How to Make Small Business Network Security Safe in 10 Tips
Healthcare Data Security: Proven Solutions to Major Problems
2015 was the “year of the healthcare breach.” There were 5 mega-breaches which resulted in over 100 million patient records being exposed, according to IBM’s X-Force Threat Intelligence Report 2016. And healthcare data security didn’t fare any better in 2016. According to Symantec’s 2017 Internet Security Threat Report (ISTR), the number of reported breach incidents increased by 22 percent last year, rising to 328 from 269 in 2015 - with healthcare being the 2nd most attacked service in the “Services” industry category. 2016 was also the year of email cyberattacks on healthcare. Symantec’s 2017 ISTR found that 54% of their emails contained spam, 1 in 4,375 emails were phishing attempts, and the number of email-borne … [Read more...] about Healthcare Data Security: Proven Solutions to Major Problems