Healthcare Spotlight: Big Challenges, Bigger Solutions

Since the onset of COVID-19, it’s been challenge after challenge for hospitals nationwide. While tending to the unique and weighty demands of the pandemic, healthcare is simultaneously under siege from malicious actors seeking to take advantage of overworked staff and stretched IT security protocols. As our readers know, healthcare is one of the most at-risk […]

Toward A Hybrid Workforce: The Future of IT Security

When 2020 began, no one could have predicted the working world’s massive shift to remote environments. Now, from VPNs to ever-expanding endpoints, remote security culture has become an integral aspect of today’s IT security. But what does that mean for the future? COVID-19 has irrevocably changed how we approach the modern office model, stretching our […]

2020 Goes Phishing: 10 Most Effective Scams This Year

Strange correspondence in your email inbox? Unsolicited phone call from corporate? Though you may not know it, you’re on the wrong end of a phishing scam—and it’s time for you to sink or swim. Phishing, or deception via electronic communication to obtain sensitive data, is a notoriously common practice among cybercriminals. Phishing scams may ask […]

Endpoint Essentials

An ever-expanding digital network with increasing connectivity of devices worldwide means a far broader field of vulnerabilities. As the Internet of Things (IoT) criss-crosses our professional and personal lives and devices, risk rises exponentially for endpoint security. In any organization’s internal network, an endpoint is a device or system that can link to that network. […]

Threat Intelligence: The Full Court Press Against Risk

You can always add new strategies to your IT security defense, but what if you could see into cybercriminals’ playbook? Readers of our blog will know that, apart from providing top-shelf IT security assessments, we’re also a strong proponent of risk management. In a world increasingly infiltrated with ransomware and malicious actors taking advantage of […]

Shorthanded: The Cybersecurity Skills Gap

In the age of COVID-19, cyber threats stop for no one and nothing. You’ll need all hands on deck to combat opportunistic attackers, but their offense may be better than your defense. Industry experts note the IT security skills gap is growing larger every day. Why? Most organizational leaders lack a decisive understanding of IT […]

Man OUT Of The Middle: Security in the IoT

From smartphones to smart fridges, the future is now, and it’s everywhere. Nowadays, most devices are more or less linked into the Internet of Things (IoT), a term first coined by technology specialist Kevin Ashton in 1999 and currently used to describe a system of interconnected computing devices that can exchange data without a human […]

Leadership: Covering Your Security Achilles Heel

From phishing email campaigns to filched administrator credentials, we’ve seen hackers assault systems from all sides. Experts recommend the best defense is a unified front against malicious actors, but what happens when the very place you expect IT security policies from—your leadership team—is actually your organization’s Achilles heel? Ideally, IT security practices run like a […]

Red Team Rising: New Era Tactics

It’s a race to the next innovation in security and hacking, and in a remote-working world, the path is more dubious than ever before. Red Team Assessments, or real-world cyber attack simulations, are designed to imagine the worst case scenario to put an organization’s defenses to the test against present-day malicious methods. But with an […]

Head In The Cloud: The Capital One Ruling

Failing to address your organization’s shortcomings in cybersecurity will always have ramifications, but they won’t always come from where you expect. Exhibit A: Earlier this month, bank holding corporation Capital One was hit with a cease and desist order from the Office of the Comptroller of the Currency (OCC), citing a “failure to establish effective […]