The fact is that the people behind the keyboards are your weakest endpoints and the apathy in recognizing that fact is the biggest security threat of organizations today. So, what do we do to address this risk?
With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.
It happens all the time: Employees, departments or even third-party entities request access to business applications so they can perform important tasks. How much access should they be granted - and to which systems and data. Expert Mike Fitzmaurice sheds some light on enterprise application workflow best practices.
The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.
Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?
If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.
The Payment Card Industry Security Standards Council has updated its data security standard. PCI DSS 3.2 went into effect November 1, which means many organizations are now scrambling to come into compliance--while also preparing for the busiest time of the year.