Cybercriminals are employing more sophisticated techniques all the time and
far too many companies and organizations still don't have the protection they
really need to safeguard their systems.
The prevalence of targeted attacks and advanced persistent threats (APTs) is
The risk is that security is breached, typically through manipulation of
employees using a technique such as spear phishing, and existing security
systems are unable to detect the attack. Data can be harvested for many
months, or even years, before the breach is discovered.
According to a white paper from the Enterprise Strategy Group, 59% of
enterprise security professionals believe their organization has been the
target of an APT, and 40% of large organizations have invested in various new
security technologies as a direct result of APTs.
How Do They Get In?
Penetration may be achieved... (more)
Despite all the news about hackers infiltrating major corporations, most
businesses continue to leave themselves woefully unprotected. Some surveys
estimate more than 70% of businesses perform vulnerability tests on less than
10% of their cloud, mobile and web applications. A majority also confess they
have been hacked at least once in the last two years.
While most large businesses have begun application vulnerability testing,
there is still a long way to go. After all, you are only as strong as your
weakest link; hackers will undoubtedly find and attack any application
Whether you choose to embrace it or you try to resist it, the BYOD (Bring
Your Own Device) trend is set to grow. The Cisco IBSG Horizons Study found
that 78% of white-collar workers in the U.S. use a mobile device for work
purposes and 41% of respondents indicated a majority of smartphones
connecting to their company network are actually employee-owned.
If you don't already have a BYOD policy then you need one right now.
The trouble is that employees will connect to your network and use their
personal mobile devices for work whether you allow it or not. In the past
your company n... (more)
The cloud computing revolution is well underway and there are lots of
benefits to be realized. According to Awesome Cloud research the industry
will be worth more than $150 billion this year, compared to $46 billion just
six years ago. Mirroring the general trend for SaaS solutions, cloud-based IT
security systems can be an ideal fit for smaller businesses, freeing them
from internal IT overhead, cutting complexity, and providing scalability.
Here are five reasons that switching to a cloud-based endpoint security
system makes sense for your business:
1. Best practices are built-i... (more)
Many IT departments have weak patching processes - especially on the
client-side. And it's no wonder - patching is tough. Across all industries
and platforms, the Window of Exploit (WOE) - that is, the time lag between
announced discovery and the availability of a patch - for web-based
vulnerabilities is a whopping 233 days, according to WhiteHat Security. This
leaves your organization exposed for an unacceptably long period of time.
It may not be glamorous, but a meticulous patching program is necessary to
prevent server and client-side exploits. HP's DVLabs and other research ba... (more)