Healthcare Spotlight: Big Challenges, Bigger Solutions

Since the onset of COVID-19, it’s been challenge after challenge for hospitals nationwide. While tending to the unique and weighty demands of the pandemic, healthcare is simultaneously under siege from malicious actors seeking to take advantage of overworked staff and stretched IT security protocols. As our readers know, healthcare is one of the most at-risk […]

Toward A Hybrid Workforce: The Future of IT Security

When 2020 began, no one could have predicted the working world’s massive shift to remote environments. Now, from VPNs to ever-expanding endpoints, remote security culture has become an integral aspect of today’s IT security. But what does that mean for the future? COVID-19 has irrevocably changed how we approach the modern office model, stretching our […]

Endpoint Essentials

An ever-expanding digital network with increasing connectivity of devices worldwide means a far broader field of vulnerabilities. As the Internet of Things (IoT) criss-crosses our professional and personal lives and devices, risk rises exponentially for endpoint security. In any organization’s internal network, an endpoint is a device or system that can link to that network. […]

Threat Intelligence: The Full Court Press Against Risk

You can always add new strategies to your IT security defense, but what if you could see into cybercriminals’ playbook? Readers of our blog will know that, apart from providing top-shelf IT security assessments, we’re also a strong proponent of risk management. In a world increasingly infiltrated with ransomware and malicious actors taking advantage of […]

Shorthanded: The Cybersecurity Skills Gap

In the age of COVID-19, cyber threats stop for no one and nothing. You’ll need all hands on deck to combat opportunistic attackers, but their offense may be better than your defense. Industry experts note the IT security skills gap is growing larger every day. Why? Most organizational leaders lack a decisive understanding of IT […]

Red Team Rising: New Era Tactics

It’s a race to the next innovation in security and hacking, and in a remote-working world, the path is more dubious than ever before. Red Team Assessments, or real-world cyber attack simulations, are designed to imagine the worst case scenario to put an organization’s defenses to the test against present-day malicious methods. But with an […]

Reassessing Security Priorities: The Mid-Year Shuffle

Early this year, we posted an overview of threats and technologies to look out for in 2020. But no one could have predicted what was to come in the months that followed, and now, organizations worldwide are re-evaluating their priorities—starting with cybersecurity. This Tuesday, Hitachi ID published “Top IT Budget Priorities Through 2020,” based on […]

Lessons In Zero Trust Security

When it comes to the increasingly perilous frontier of cyber threats, no one is in the fight alone. But as officials at the Pentagon learned, a solid team defense doesn’t make you exempt from the benefits of Zero Trust, a perspective on cybersecurity that holds everyone accountable regardless of role. In the midst of the […]

Hackers Vs. Hospitals: What You Need To Know

The novel coronavirus is giving cybercriminals a chance to restructure their attacks for vulnerable targets, and hospitals are at the top of the list. More specifically, they’re after patient data—and with an influx of new patients and healthcare organizations working at maximum capacity, the stakes are higher than ever. Across the nation, hospitals cope with […]

Bolstering Security For Small To Midsize Businesses

Public health isn’t the only thing at risk amid the COVID-19 pandemic. For cybercriminals capitalizing on the chaos, small to midsize businesses, or SMBs, are the perfect gambit: smaller firms are less likely to believe themselves an “attractive” target for cyberattacks, which leads them to slack on cybersecurity protections. It’s easy to be lulled into […]