
Making The World Safe For Everyone
If you provide security protection for a living, you dread waking up to learn that one of your customers has succumbed to an attack from outside rogue source. As frightening as this scenario is, a systems breach is more likely to occur from within—more often than not by simple human error. It’s true. Studies show most cyber compromises are caused by employees who don’t follow proper procedures, who operate in a careless manner or who lack expertise and click on things they sh

Protecting Against and Surviving a Targeted Attack
The Sony data breach made it obvious to us all that it is possible for even the biggest of companies to be subject to a targeted attack. With losses in revenue and reputation in the hundreds of millions of dollars, it’s imperative for companies today to recognize the need to protect endpoints, servers, and infrastructure that can serve as an entry point for an attacker – whether external or internal. In this supercast, I discuss the realities of external attacks beyond just t

SMBs Are At Higher Risk Of Cyber Crime
If you work for a small business, you probably believe you’re not a target for cyber crime, largely because you have little of value to be stolen. You’re not alone. Almost half (44%) of small business management don’t see cyber crime as a priority either. But with 42% of small businesses experiencing at least one attack in the past 12 months, that thinking needs to be turned around. Phishing, malware, zero-day attacks, application vulnerabilities, and good old-fashioned autom

Three Basic Steps to Avoid Hacker Attacks
In the wake of so many security breaches, each news report seems to always focus on two things and two things only: The number of people/credit cards/passwords etc affected and the cause of the breach. Take a database breach at Comixology – the “cause” was a hacked database. Not surprising, as the 2013 Verizon Data Breach Investigations Report cites 92% of breaches involve outsiders and 52% of those breaches involved hacking. Like most breaches, we’re never given more detail