Encryption-Based Cyber Attacks Are Increasing: How to Stay Safe

Encryption’s popularity has gone through the roof over the past few years, however, it may not be the cyber security silver bullet some hope. The volume of encrypted traffic traversing the web has increased roughly 90% each year since 2015. If those year-over-year growth patterns hold true, Gartner forecasts that, come 2019, 80% of all […]
Overconfidence and 7 Other Deadly SMB Cyber Security Sins

A gap seems to be forming between what businesses believe about their cyber resiliency and the reality of the situation. Actually, calling it a gap may be underselling it. In its report titled Cyber Security: Can Overconfidence Lead to an Extinction Event?, Solar Winds found 87% of businesses rate their cyber security defenses as “average or […]
Coming to America? California Passes GDPR Copycat Bill

GDPR only went into effect in late May, but it’s already inspired like-minded data privacy legislation on this side of the Atlantic. California, America’s technological heartland, recently signed off on a law that will give consumers greater control over their personal data. Much like GDPR before it, the new law’s impact could be widespread. While […]
3 Cyber Security Fundamentals Often Overlooked During M&As

Businesses have made cyber security an integral part of their M&A processes – so why are so many issues going unnoticed? Consider one study in which the vast majority (80%) of businesses agreed cyber security had become a critical part of M&A due diligence 1. However, in that same survey, more than one-third of businesses admitted […]
Cyber Security Worst Practices – 9 Must-Break User Habits

People can be a business’s greatest asset, but they can also be its biggest cyber security liability. Cyber criminals are drawn to the path of least resistance and, when compared to today’s highly advanced security solutions, that’s often what users represent. Unfortunately, users have done little to diminish that reputation. Instead, many have developed bad […]
6 Ways Duo MFA Helps You Be More Secure and User-Friendly

Rolling out a multifactor authentication (MFA) solution such as the one offered by Duo is a good way to reinforce a cyber security weak point: end users. That is, of course, unless users find this added security to be a productivity roadblock. Should that happen, they may attempt to circumvent it or petition upper management […]
GDPR May Very Well Impact You – Are You Ready?

GDPR takes effect on May 25, 2018. Fines for non-compliance can go as high as 4% of annual global turnover or $20M, whichever is higher. The two-year transition period started on April 14, 2016, but like most regulations, it’s been easy to push off until later … well later is now. With just under two […]
5 Things Businesses Demand From End User Computing & How to Deliver Them

Digital transformation has had an impact on all facets of modern businesses and end user computing (EUC) is no exception. In recent years, end users have begun to rethink their work tools and what constitutes a workspace. They’ve called for greater flexibility and the responsibility for delivering that has fallen on IT. Should IT come […]
4 Calling Cards of a World Class Incident Response Plan

One of the great truths in cyber security, just like in life, is that there’s nothing wrong with expecting the best – as long as you make sure to prepare for the worst. Recent research by The Ponemon Institute, however, suggests far too many businesses are expecting the best cyber security-wise and simply leaving it at that. […]
How Not to Respond to a Cyber Security Vulnerability

The worst way to find out about a cyber security problem is from somebody outside of your organization. We’re paraphrasing the words of Tom Clerici, Director of our Cyber Security Practice, who wrote something similar in a blog from early last year in which he stressed both the increasing inevitability of cyber attacks and the need for […]