cloud security

It’s in the Cloud, So it Secure . . . Maybe!

Since the introduction of cloud computing, more and more companies have been flocking to cloud computing, because it has proven to be cost effective and inherently more secure than on premise data centers. However, no one has ever claimed that making switch magically happens by pressing a button. Cloud computing needs to be properly managed and configured. Processes and policies that protect the data and applications that reside in the cloud need to be developed and continuously monitored to stay within best practices.

online security

5 Areas to Consider to Keep You Safe Online

It doesn’t matter if you are a CEO, accountant, or dog trainer – everyone needs to be secure online. October is National Cyber Security Awareness Month (NCSAM) and one of the main goals of the event is for us “security experts” to think of new ways we can educate our family, friends, and peers to be secure online. Even with all the technology available to businesses now, we still find the human element of security to be the weakest link.

SDN

Take a Dynamic Approach to SDN Security

Virtualized networks and SDN (software-defined network) architectures are “the next big thing,” offering businesses new opportunities to grow and change. They bring together far-flung facilities in a single, secure network and let people from all locations communicate as if they were in the same building. SDNs also create big challenges to IT and cybersecurity teams. Instead of securing one physical data center, they must now secure an increasingly large, complex and distributed network in a virtual environment.

Cloud Data

2 Ways to Speed Recovery from Cloud Data Loss

Despite organizations’ readiness to embrace cloud and awareness of the risks, too many are too slow to recover from data loss. For example, research from Everbridge finds that organizations take an average of 27 minutes to rally the right team of experts once they declare an incident, and those minutes add up quickly in direct costs to the business. With unplanned IT downtime costing $8,662 per minute on average, companies today are spending an average of $233,874 just to get the right team in place and begin recovery efforts.

cybersecurity

3 Mistakes Never To Make When Evaluating Cybersecurity

Over the past decade, the cybersecurity market has exploded, and growth remains brisk. Cybersecurity Ventures expects that the cybersecurity spending globally will reach $1 trillion by 2021, up from an estimated $120 billion this year.

Despite this increased spending on security products and services, when it comes to protecting their digital infrastructure, organizations are struggling to stay ahead of the bad guys. One reason is a lack of due diligence when evaluating new vendors and their offerings.

Risk-based cybersecurity

Risk-Based Cybersecurity In Finance: Step By Step Guide

A recent letter drafted by the Financial Services Roundtable (FSR) and sent to financial services companies promotes a risk-based cybersecurity approach. Noting the diversity of institutions, the FSR proposes moving away from imposing rigid requirements on all firms; and instead, holding individual firms accountable for customizing cybersecurity programs that align with their risk profile.