We are social creatures, and now that our social circles are almost entirely digital, the mass migration of millions of voices, cultures, and values is starting to show up in both wonderful and not-so-wonderful ways. Our kids are watching it all unfold; absorbing what works and discarding what seems trifle or antiquated. The evidence of the ...
Read Blog
It feels like the last song of the concert—this is the final blog in our cybersecurity benchmark series! As every good detective starts with information, we’ve been digging into the classic six “w” questions: who, what, when, where, why, and how. To find those answers for security professionals, data was combined from Ponemon Institute’s global ...
Read Blog
Nowadays, everyone knows how important data is. Who hasn’t seen a sensational news story about a data breach lately? Despite all this public exposure, however, not everyone is qualified to protect organizations against breaches. It takes more than binge-watching a season of Mr. Robot to become a cybersecurity expert, or many of us would be ...
Read Blog
The Universidad de Las Américas (University of the Americas or UDLAP) in Puebla, Mexico, is one of Latin America’s most prestigious universities. And just like colleges of all sizes across the global, UDLAP recognizes that one of its greatest security threats comes from outside devices connecting to the school’s network via Wi-Fi. The number of ...
Read Blog
If anything has been proven in recent years, it’s that you don’t have to worry about a data breach happening, you have to count on it. The latest incident involving cloud storage vendor Dropbox casts an onerous spotlight on several issues facing enterprise security experts. Beyond the corporate password issue, the real question is what’s ...
Read Blog
How Effective is Your Web Security? Evolving Your Internet Defense Strategy Whether it’s a link clicked in a phishing email, or drive-by download from a malicious advertisement – the internet is responsible for more security incidents than any other source of attack. Most organizations still rely on the old model of URL filtering to protect ...
Read Blog
Data breaches are commonplace. Every organization that handles sensitive or private data should have a proper capability to respond to an incident. Many companies have a basic set of procedures, while others maintain a mature set of people and processes. A small percentage of organizations over the years have refined their capabilities to a professional level. ...
Read Blog
In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This email ‘bait’ I’m referring to comes in the form of phishing scams, which are becoming increasingly abundant as ...
Read Blog