Ransomware: A Top Security Threat for Higher Education

2016 was the year of the hacker. From Russian hackers targeting US elections to the jaw-dropping compromise of more than 1 million Yahoo! user accounts and the DDoS attack that "broke the Internet," it seems like hacks and data breaches were in the news every day. Russian hackers aside, ransomware was the cybersecurity topic that captured the year’s headlines.

Read More

Identity and Access Management Terms Your C-Suite Needs to Know


Now that your C-suite understands your company’s information security program, it’s time to move further into the educational phase.

As you evaluate and prioritize the risks your organization faces, identity and access management (IAM) should become a clearer and clearer priority. To help you educate your CEO on the need for increased investment in modern IAM solutions, here is some key IAM terminology that you can use as you work to transition your company to a more modern strategy.  

Read More

Hackers and Contingent Workers Aren't Your Only Threats...


“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained, you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”—Sun Tzu

When it comes to protecting your company’s sensitive systems and data, do you truly know your enemy? Showy hacktivists, out for nothing more than a flashy outage and media attention, are the foes who most easily spring to mind, but they’re only the tip of the iceberg. The greatest threats to corporate network and data security are 1) those who seek to intrude undetected into your systems and 2) your accidentally careless and complacent employees who let them. These intruders are patient, they’re meticulous, and they’re eyeing what you have and are planning to get it, 24/7.

Read More

Is Two-Factor Enough or Do I Need Multi-Factor Authentication?


By now, we should all be aware of the inadequacies of passwords. Breach after breach, it's been made painfully clear that single-factor authentication is not enough. But when the traditional means of authentication are so clearly flawed, what’s the next step?

Generally speaking, the best practice is to step-up your security with either two-factor or multi-factor authentication. As these standards have quickly become essential parts of the information security toolkit, they've also become top-of-mind considerations for many IT and security pros.

Read More

What Every CEO Should Know About Cybersecurity in 2017

Now that you’ve used the points outlined in the last installment of our series to discuss with your CEO how important security is to both your organization’s bottom line and your CEO’s job, it’s time to begin the process of education. There are several realities about security that your CEO must understand as you work toward a modernized security strategy that will optimally protect your organization from outside threats and inside vulnerabilities.

Read More

Strong Authentication Methods: One Size Does Not Fit All

Eliminating or reducing the number of passwords in the enterprise remains a top focus of management and security professionals alike. While single sign-on technologies, such as password managers, identity federation, and operating system-based technologies, that reduce and simplify the number of passwords have been in use for years, the number of passwords and emerging technologies to address the problem has also increased.

Read More

Phishing Campaigns Require a Proactive Approach to Security

Intruders Thrive on Complacency.

When it comes to the threat landscape, nothing makes information security teams shudder more than complacent users, whether they be employees, partners, vendors, or customers. Yearly security and awareness trainings have become all the rage (rightly so), helping to check off boxes on company compliance audits. However, all too often, new users or even seasoned veterans can be caught off-guard and open the door to evildoers.  

Read More

CEOs Must Understand Your Information Security Program


In the first installment of our series on security and the CEO, we discussed the dangerous disconnect between the rosy view of security held by the C-suite and the much grimmer reality seen in the trenches of IT. Today, we’re going to talk about the consequences of executive overconfidence in your information security program.

Read More

Your Information Security Situation: Does Your CEO Know the Truth?


The digital transformation of the last two decades has placed cybersecurity front and center on the CEO agenda. Customers now place vast quantities of personal information into the hands of businesses, with the expectation of a certain amount of privacy and confidentiality in exchange. The ability to meet this expectation is crucial in order for a business to retain customers and build its brand.

Read More

5 Information System Security Predictions for 2017


So, what does 2017 have in store for the security industry? While there’s no crystal ball that can tell us for sure, we’ve got our eye on a few key trends.

Entering a new year, we always take a look at what the latest in identity and access management  (IAM) and cybersecurity threats means for the security industry. This year, we specifically focused on answering three key questions:

Read More

Subscribe Here!