The modern digital age is more convenient than ever. Not only can you walk around with a tiny supercomputer in the palm of your hand, you can use that supercomputer to connect to the entire world over the internet, with multiple options for network protocols. However, when it comes to the cybersecurity of your mobile devices and the data they
In a world where every company’s business is increasingly its own data, it’s always a good idea to ensure that data is backed up. This is especially true in the way it encourages adopting a proactive security mindset, allowing small and mid-sized businesses to address the risk of a cyber attack or security breach before it happens.As ransomware
While the bulk of data security breaches affect large corporations, hackers can target small and medium-sized enterprises (SMEs), too. As a result, small businesses — often deemed an attractive target by cybercriminals because these companies lack the infrastructure of multi-million dollar conglomerates — are investing heavily in cloud security.
In larger environments, it is not uncommon to have both a CIO/CTO and CISO (Chief Information Security Officer). The CTO/CIO is usually held accountable for the development and implementation of the IT strategy to support the institution's business strategy in line with its risk appetite. A CISO is typically responsible for overseeing and
Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause
Research shows that WordPress and health applications are the most popular targets for online attacks. If you’re currently using WordPress for your website or offering a healthcare app, here are some key facts and figures you should know.
Content Management Systems Are Most Vulnerable
A new report by Imperva revealed that content management
According to a recent survey by Raytheon and the NCSA, young people ages 18 to 26 aren't pursuing careers in cybersecurity. Young women - who make up just 10 percent of the industry's workforce - are even less interested in cybersecurity than their male counterparts, with 52 percent of millennial women saying cybersecurity programs aren't
A firewall is a great way to protect your organization, but it only works well if it is configured properly. Here are four common mistakes in firewall configuration, along with some tips for avoiding them.
1. Non-Standard Authentication Methods
Using non-standard authentication methods can put you at risk of a cybersecurity breach. When you
A 2015 study by HP found that the average cost of cyber crime has grown to $15 million per year, which is an increase of 82 percent over the last six years. In the companies featured in the study, costs ranged between $1.9 million and a massive $65 million per year. With such large potential costs, it is vital to take action to protect your