Navigating the world of cybersecurity can be overwhelming. Any wonder why the percentage of U.S. employees who lack a basic understanding of cybersecurity best practices is estimated to be 70%? One thing remains certain. No matter how large or small – any business (or employee) that thinks they are not at risk for a cyber attack is only fooling themselves.
October is Cybersecurity Awareness Month. Did you know… one in five small businesses will suffer a cyber breach this year? 81% of all breaches happen to small and medium sized businesses? To help boost awareness, we compiled a Cybersecurity Awareness Checklist with the 15 most effective tactics your security team should be doing to protect your company, your staff, and your clients’ data from a cyber-attack.
Today’s data breach epidemic is serious. Not a week goes by without another story in the news about another large data breach. Unfortunately, these breaches are becoming all too common and, in many instances, it seems there’s little you can do to prevent them. Luckily there are several things you can do to protect your specific accounts in order to limit the damage from these breaches and reduce the time to recover.
Most apps need to collect some personal information in order to function. For example, one needs to provide personal information if you want to use a dating app in order to get connected with the people you are interested in, but what is that personal information used for, who is it shared with, how is it protected and what happens to it when you stop using a given app or service?
It’s been a little over a year since the General Data Protection Regulation (GDPR) went into effect and like all one-year-olds, the first year can be a challenge. Let’s review what the GDPR is, walk through the results from the first year, and ensure you know the proper data security precautions for your business in order to comply….
The dark web is getting a lot of attention lately. Cybercriminals leverage the anonymous nature of the dark web to launch attacks on a company’s network and on individuals. The dark web is also a hiding place for loot stolen from these cyber attacks and is an exchange where criminals can sell their wares—i.e. your stolen data….
Since passwords are required for accessing nearly everything online today, it should be no surprise that 81% of hacking-related computer breaches leveraged either stolen and/or weak passwords. Find out if you are doing what is necessary to protect your data…
Want to know about the latest cybersecurity insights for your business?