As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.
We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.
GDPR is a complex regulation comprised of 99 articles. In this 3 part series, we’ll break down the components of GDPR starting with an overview of the regulation and why you need to start preparing now. Part 2 will discuss some of the key elements including obtaining valid consent, online data technologies, privacy notices and cross border transfer. Part 3 will dive deeper into understanding the obligations of a Data Controller and Data Processors, individual rights, and the 72 hour data breach notification requirement.
“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” - Abraham Maslow, The Psychology of Science, 1966. But using firewalls to protect against DDoS attacks has its limitations.
Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.
Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.
When technology evolves faster than our ability to make sure there's a viable level of safety, how do we educate businesses and the layperson on best practices for IoT security? In this part 2 InfoSec Life article, Phil Agcaoili, CISO, shares his views on the need to raise InfoSec awareness in society while striving for (and embracing) diversity in cybersecurity.
Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. In this Experts Corner, Chuck Brooks pulls together a collection of links highlighting some of the more alarming cybersecurity statistics.
The founder of “Code Like A Girl” explains the overt sexism she experienced growing up, later in college and in the corporate world merely due to her gender, which made her only more determined to make strides for women who are interested in a tech-oriented career.
Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.
Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.
In the fragmented world of cybersecurity, equipping small businesses for cyber threats and preparing the next generation of infosec professionals will require community-based workforce development.