Hybrid work has changed where, when and how we work. We take a closer look at four considerations for hybrid workplace security, so you can mitigate potential risk and create a more secure environment for the future of work.
Read post
Enterprises that have embraced UC&C and UCaaS during the pandemic are now on the hunt for collaboration security solutions. Here are five things enterprises can do right now to make their collaboration platforms more secure.
Read post
Financial institutions are a prime target for cyberattacks, especially in the era of remote work—yet they’re responsible for proactively protecting customer data. These three strategies can help to enhance compliance, avoid fines and improve trust with customers.
Read post
Since many enterprises are still fine-tuning their collaboration setup, panelists at Enterprise Connect concurred that many questions about collaboration security simply do not have definitive answers yet. Here are highlights from the discussion around three of those questions.
Read post
Cybersecurity that leans heavily on the physical location of workers and enterprise assets doesn’t cut it anymore. While zero trust isn’t a brand new concept, it’s gaining new popularity as freshly enabled hybrid workplaces search for alternatives to location-based cybersecurity.
Read post
Cyberattacks are threatening hospital IT systems via ransomware and, increasingly, connected medical devices. These breaches don’t just put patients’ privacy and data at risk—they put people’s lives at risk. Here’s what can be done to combat this growing threat.
Read post
From cloud firewalls to blockchain, technology creates a foundational layer for building a culture of cybersecurity in financial services firms—at a time when the industry is digitizing services, adopting cloud and transforming the traditional banking model.
Read post
A new task force is calling on governments to take action to reduce the risk of ransomware at scale, but there’s plenty that enterprises can do to mitigate risks and potentially avoid paying ransom. Here’s our coverage from this year’s SecTOR IT security education conference.
Read post
The mass exodus of workers from office to home has contributed to the rise of ransomware. Attackers are setting their sights on the private sector and asking for more money, with the average ransom demand now topping $10 million.
Read post
With brand new risks related to 5G network slicing and inherited risks like 4G vulnerabilities, could the cloud risk model be the answer for a more secure 5G network? While it’s still early days, we explore some of the issues — and potential solutions.
Read post
While software-defined WANs offer encryption, authentication is harder to do over SD-WAN, particularly in our current WFH environment. Authentication relies on trust — which is why we need a zero trust approach to network security.
Read post
Even if you were already shoring up your defences — systems, networks and devices, in the office and remotely — the pandemic pushed this to the top of the IT security agenda with an unprecedented urgency. We look at what organizations can expect in the year ahead.
Read post
While WFH threats are on the rise, IoT security risks within traditional enterprise environments — across every industry vertical — are escalating as well. Here are 10 of the riskiest connected enterprise devices, from our SecTOR 2020 coverage.
Read post
The top IT security projects identified by Gartner for 2021 reflect the incredible amount of change brought on by COVID-19: They’re heavily focused on process and risk management — and often require thinking beyond the technical aspects to consider the broader business.
Read post
Many companies are turning to Zero Trust to deal with a darkening cybersecurity landscape. But its successful adoption hinges on employee buy-in and behaviour — at a time when remote work is viewed as one of the biggest challenges to enterprise security.
Read post
The number of cyber attacks on IoT devices is soaring, in part due to COVID-19 — and this will only increase as 5G is rolled out. We look at some of today’s biggest malware threats, how COVID-19 plays a role and how to protect employees who are working from home.
Read post
Pandemic-related vulnerabilities, including home-based workforces and mobile WFH devices, have left big gaps in security. And evolving cyber attacks — like blended extortion-ransomware — mean that organizations can’t afford to let their guard down.
Read post
COVID-related cyber attacks are on the rise. So as companies slowly move at least part of their workforce back to the office, it’s important to review lessons learned since the start of work-from-home orders to bolster IT security during this awkward transition phase.
Read post
Since mid-March, we’ve seen an increase in the volume and scope of cybersecurity attacks as employees working from home and transitioning back to the office present a tempting target for malicious actors. This could change the way your business evaluates risk for years to come.
Read post
Working from home puts our workplace data and networks at greater risk of being infected by virtual threats like malware, spyware and ransomware. We talk to a security pro for tips on how enterprises can protect their networks while enabling WFH during the pandemic.
Read post
While it’s no surprise that malicious traffic has skyrocketed during the first nine months of this year, research from Cisco Umbrella—the cloud-based cybersecurity platform formerly known as OpenDNS—also revealed a few surprises about today’s threat landscape.
Read post
The same blockchain technology that can enhance security for cryptocurrency could also revolutionize cybersecurity, according to the Cloud Security Alliance. Here’s our take from the recent SecTOR IT security conference in Toronto.
Read post
If you’re trying to shift your existing technology to the cloud and patch it like a quilt, stop right there. Instead, follow these key takeaways from SecTor about managing security and compliance gaps in enterprise cloud environments.
Read post
Zero Trust isn’t a product or a solution; it’s a philosophy and a strategy around cybersecurity that demands inward reflection. We look at how it works, the pros and cons of this approach, and why it may — or may not — be the right fit for your organization.
Read post
More people are working remotely these days, but malicious actors aren’t taking a break — so we can never fully let our guard down when it comes to digital security.
Read post