Why the Hype about SDWAN
Software Defined WAN (Wide Area Network) is currently a hot topic in IT conference rooms across the globe. SDWAN is not a new topic or product for that matter. So why all the hype about SDWAN?
DetailsSoftware Defined WAN (Wide Area Network) is currently a hot topic in IT conference rooms across the globe. SDWAN is not a new topic or product for that matter. So why all the hype about SDWAN?
DetailsThe ransomware industry is exploding, an unearthed pot of gold for cyber attackers. Often, if not everyday one can find a story or an article related to a new occurring ransomware attack. For cybercriminals, ransomware is a lucrative prospect, easily accessible and with a relatively low risk. By the same token, it is a hellish nightmare for CEOs; offline networks, lost productivity and other bureaucratic issues.
DetailsDespite organizations’ readiness to embrace cloud and awareness of the risks, too many are too slow to recover from data loss. For example, research from Everbridge finds that organizations take an average of 27 minutes to rally the right team of experts once they declare an incident, and those minutes add up quickly in direct costs to the business. With unplanned IT downtime costing $8,662 per minute on average, companies today are spending an average of $233,874 just to get the right team in place and begin recovery efforts.
DetailsThey always say teach by example. I find that the IT Profession is one of those professions where business examples are not necessarily followed personally by associates. The biggest example of this would be safeguarding personal data. You all know who you are!
DetailsNowadays, the issue of proper cybersecurity has become increasingly relevant. The number of cyberattacks rises every year and it’s getting pretty hard for businesses, even as big as Microsoft, to protect the data from being attacked by a virus. Therefore, business cybersecurity is a must.
DetailsOver the past decade, the cybersecurity market has exploded, and growth remains brisk. Cybersecurity Ventures expects that the cybersecurity spending globally will reach $1 trillion by 2021, up from an estimated $120 billion this year.
Despite this increased spending on security products and services, when it comes to protecting their digital infrastructure, organizations are struggling to stay ahead of the bad guys. One reason is a lack of due diligence when evaluating new vendors and their offerings.
DetailsYour identity is as dearest to you as your life. It is what empowers you to make connections, engage in social engagements, request credit loans, apply for lucrative job opportunities, create online bank accounts, and more.
DetailsDuring your travels, it is easy to become so preoccupied with sharing your travel stories online that you forget to protect yourself against cyber threats. When it comes to cybersecurity, most people associate it with safe cyber practices at home, but practicing safe online behavior is just as important when you’re traveling.
DetailsNot long after the IP Bill was brought to life (November 2016), when the providers got the open hands to hold users traffic data for a year, came the “targeted consultation”, which has not been publicised, about the end-to-end encryption weakening.
DetailsA recent letter drafted by the Financial Services Roundtable (FSR) and sent to financial services companies promotes a risk-based cybersecurity approach. Noting the diversity of institutions, the FSR proposes moving away from imposing rigid requirements on all firms; and instead, holding individual firms accountable for customizing cybersecurity programs that align with their risk profile.
DetailsWe have a term in our household that when any item with the thought to be ‘done with’, and is on its way to the trash is prefixed with term ‘Garbage’. While it’s not the most elegant term, it has stuck with most items. One of the best examples is when Garlic Bread gets a ‘little’ burnt. On its way to the trash, it usually gets intercepted by the men in the house and is lovingly referred to as Garbage Bread.Have an old Server? Is it a Garbage Server? Don’t throw it away just yet.
Details2017 was expected to be the year when Internet of Things would be the favorite prey for hackers, only for all the right reasons. The expectation was put forward by researchers and smart home analysts from around the world that by 2020, consumers and businesses would integrate as many as 50 billion smart home devices in their homes and offices. While smart devices are a great way to automate daily chores, they also make consumers vulnerable to attacks and infiltrations.
DetailsIt is safe to say that most people from eleven to eighty have a smartphone. However, most of these users are unaware of a simple fact: your smartphone is far more vulnerable than most of us think. The reasons are many; this blog will focus on some of the reasons.
DetailsIf you were still in any doubts about your responsibility for keeping your online data safe, the recent crisis enveloping the NHS and its lack of defense against cyber attacks in 2017 should destroy them.
DetailsToday, companies are able to perform tasks that were previously impossible, thanks to the technologies that create, store and examine large sets of data. But, this benefit has its own sets of risk, precisely from a security standpoint.
DetailsIt appears there’s another global ransomware outbreak occurring that’s effecting banks, telco’s, and critical infrastructure.
There are multiple countries in Europe stating they’re infected with confirmed reports coming in from UK, Spain, Ireland, Russia and Ukraine.
DetailsMost small and midsize businesses (SMBs) consider focusing on cybersecurity a lower priority than financial success, but that’s a mistake. Without the right security in place, many SMBs may no longer have a business to worry about.
DetailsWhen most people think of business innovation, the first thing they think about is coming up with new products and services. However, innovation can apply to a number of areas in the business world, including security. Some of the most innovative companies use their thinking to boost their security with new and creative ideas. Here are a few things to learn from innovative examples:
DetailsDDoS is an acronym for Distributed Denial of Service. Nevertheless, as the title suggests this blog will address the who, what, why, and how of a DDoS attack (Credit to: www.incapsula.com “Anatomy of a DDoS Attack”).
DetailsOver the last twenty years, wireless has gone from a novelty to a necessity. Providing a wireless network is what encourages worker mobility as well as mobility of thought. But the challenges the wireless network present are daunting. Implementing security properly is paramount when designing and implementing a wireless LAN (WLAN). An organization needs to determine how to address Guest and BYOD postures while keeping known devices and users segregated from the rest of population.
DetailsWith many individuals information being compromised both physical and logical information security is on the forefront of many people and businesses minds. The fear of being on CNN headline news and or individuals private information being forward facing of the internet for everyone in the world to see is concerning and real.
DetailsThe back-to-back WannaCry and Adylkuzz outbreaks in mid-May mark a turning point on the cybersecurity landscape. Both attacks had far-reaching global ramifications—spreading chaos throughout all types of organizations—big and small. But it looks like we got lucky.
For all of the disruption they caused, these attacks were surprisingly amateurish. Just think of the devastation a more developed attack could cause. But make no mistake—these attacks serve as a warning. Organizations need to heed the lessons learned and adjust their cybersecurity strategies accordingly.
DetailsOnline safety has become a concern for almost all users and organizations over the last decade, which can be solely attributed to the ever-increasing scams and cyber-attacks. Recently, it came to light that Facebook and Google had been conned for $100 million by a guy who used fake accounts for sending phishing scam emails.
DetailsPhishing attacks are among the growing threats gaining popularity and creating havoc in the Internet world. In the previous blog, Phishing Attacks Part 1: Major History Moments to Learn From, 5 major attacks in history were detailed. As these type of attacks increase in diversity and complexity, it becomes increasingly important to minimize the chances of becoming a victim of a phishing attack.
DetailsHospitals and the overall healthcare sector are experiencing a major digital evolution that is pushing them to change their traditional ways of information management. To close the gap with their needs and changing IT infrastructure agility, security, compliance, and performance, many organizations are probing for benefits of cloud. The traction of on-demand cloud services along with cloud security have swiftly changed the healthcare sector mindset from “why move to the cloud?” to “what and how should we move to cloud?”
DetailsStudies and researches have shown that IT vulnerabilities and threats are remarkably increasing day by day and they are becoming a burning issue among Netizens nowadays. Phishing attacks are among these threats which have gained popularity by creating havoc in the Internet world.
DetailsIn a past life I use to be part of a team that developed Video Games. Besides the storyboarding and coding that was part of the process, we also had to accommodate the idea that any user might try to ‘break’ the game in one way or another. We built in fail safes of all sorts to make sure that the game would always run as expected with a predicted outcome. Part of this process was to try and anticipate what type of nefarious action the player would make.
Details