Blog

Blog

Common Misconceptions About SOC Reporting

Service organization reports (SOC) are vital to businesses. These internal reports let organizations know about the risks associated with outsourced services. They help to establish regulatory compliance and are an extremely important part of any cybersecurity audit. Organizations use SOC reporting to reveal vulnerabilities in their current

Read More…

Are Retail IT Professionals Really As Prepared As They Think for Security Breaches?

Protecting company records as well as private and confidential customer information is a top priority for many businesses. After all, just one security breach can devastate large companies and possibly destroy smaller businesses. Comprehensive IT security is especially important for those organizations in the retail industry.

According to a recent

Read More…

6 Key Tips for Penetration Testing in 2016

The need for penetration testing has become a fact of life in 2016. As businesses grow more reliant on online activities — and often require 100 percent effective network uptime — penetration testing remains the best way to ensure your systems are safe and secure.

However, penetration testing is definitely not a “set it and forget it” 

Read More…

4 Essentials Every Company Needs for an Incident Response Plan

Behind nearly every cybersecurity breach in recent years is a business or organization that was left to grapple with the fallout. Indeed, organizations that suffer a major security incident can end up spending tens, or even hundreds of  millions of dollars  on remediation costs, fines, damages and other related expenses. However, even major breaches

Read More…

3 Tips to Encourage Collaboration In Your Organization's Security Processes

While information security has assumed top priority in many organizations, the steps that enterprises take to strengthen their overall cybersecurity often focus solely on improving the technology and processes involved in those efforts. Unfortunately, such a heavy focus on the technical mechanics of cybersecurity neglects the human side of the

Read More…

5 Common Programming Languages That Cause the Most Software Vulnerabilities

Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause

Read More…

WordPress and Health Applications Are Now the Most Popular Web Attack Targets

Research shows that WordPress and health applications are the most popular targets for online attacks. If you’re currently using WordPress for your website or offering a healthcare app, here are some key facts and figures you should know.

 

Content Management Systems Are Most Vulnerable

A new report by Imperva revealed that content management

Read More…

4 Common Mistakes in Firewall Configuration

A firewall is a great way to protect your organization, but it only works well if it is configured properly. Here are four common mistakes in firewall configuration, along with some tips for avoiding them.

1. Non-Standard Authentication Methods

Using non-standard authentication methods can put you at risk of a cybersecurity breach. When you don't

Read More…

New Study: Cybercrime Costs Organizations $15 Million on Average Per Year

A 2015 study by HP found that the average cost of cyber crime has grown to $15 million per year, which is an increase of 82 percent over the last six years. In the companies featured in the study, costs ranged between $1.9 million and a massive $65 million per year. With such large potential costs, it is vital to take action to protect your

Read More…

6 Secure Password Management Systems for Your Business

Protecting the passwords of all your employees is a key part of IT risk management. Password management systems, in combination with other cybersecurity systems, can help to protect workers from becoming victims of hacking. Here are six of the best secure password management systems for businesses.

Dashlane Premium

Dashlane Premium is available

Read More…