Brazen cyber attacks by organized crime rings and political groups against high-profile retail giants, powerful government agencies, and energy facilities make news. But you may be surprised to know that one of the biggest risks to the cybersecurity of most businesses isn’t ...
Cyberattacks have become commonplace across a variety of verticals —from big box stores to toymakers and even the federal government. Security staffers are feeling the pressure to ensure their company isn’t the next one splashed across the headlines.
Healthcare providers have historically taken a perimeter-focused approach to cybersecurity which is the equivalent of building a strong fence around your property to keep the cattle safe. On the ranch, a fence may develop a small hole that allows a predator in or a stampede ...
According to 2016 survey results from The Ponemon Institute, healthcare organizations average about one cyber attack per month. So why, then, do so many remain underinvested in cybersecurity? That’s a question we often ask ourselves and encourage healthcare executives to ...
In response to increased compliance concerns and the need to protect against security breaches, more companies are implementing SIEM technology to more easily collect, correlate and analyze data and security alerts from a central location. But once a SIEM is in place, how ...
The days of dividing your firewall up into three primary zones—inside, outside, and DMZ—have come to an end. Security standards such as PCI-DSS, HIPAA, NIST, and a host of others, all suggest the use of segmentation in order to protect critical systems.
You've seen it in the news: cyberattacks on big, billion dollar companies expose millions of customers’ personal information, and that draws a lot of media attention. Attacks on smaller companies tend to fall under the radar, leading many to think they’re "too small" to ...
Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is ...
Think about the last time you went to a restaurant and experienced truly terrible service. Whether you waited an hour for your food, they messed up your order, your server needed an attitude adjustment, or all of the above, how likely is it that you will return anytime in ...
Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”