Even if you were already shoring up your defences — systems, networks and devices, in the office and remotely — the pandemic pushed this to the top of the IT security agenda with an unprecedented urgency. We look at what organizations can expect in the year ahead.
Read post
While WFH threats are on the rise, IoT security risks within traditional enterprise environments — across every industry vertical — are escalating as well. Here are 10 of the riskiest connected enterprise devices, from our SecTOR 2020 coverage.
Read post
The top IT security projects identified by Gartner for 2021 reflect the incredible amount of change brought on by COVID-19: They’re heavily focused on process and risk management — and often require thinking beyond the technical aspects to consider the broader business.
Read post
Many companies are turning to Zero Trust to deal with a darkening cybersecurity landscape. But its successful adoption hinges on employee buy-in and behaviour — at a time when remote work is viewed as one of the biggest challenges to enterprise security.
Read post
The number of cyber attacks on IoT devices is soaring, in part due to COVID-19 — and this will only increase as 5G is rolled out. We look at some of today’s biggest malware threats, how COVID-19 plays a role and how to protect employees who are working from home.
Read post
Pandemic-related vulnerabilities, including home-based workforces and mobile WFH devices, have left big gaps in security. And evolving cyber attacks — like blended extortion-ransomware — mean that organizations can’t afford to let their guard down.
Read post
COVID-related cyber attacks are on the rise. So as companies slowly move at least part of their workforce back to the office, it’s important to review lessons learned since the start of work-from-home orders to bolster IT security during this awkward transition phase.
Read post
Since mid-March, we’ve seen an increase in the volume and scope of cybersecurity attacks as employees working from home and transitioning back to the office present a tempting target for malicious actors. This could change the way your business evaluates risk for years to come.
Read post
Working from home puts our workplace data and networks at greater risk of being infected by virtual threats like malware, spyware and ransomware. We talk to a security pro for tips on how enterprises can protect their networks while enabling WFH during the pandemic.
Read post
While it’s no surprise that malicious traffic has skyrocketed during the first nine months of this year, research from Cisco Umbrella—the cloud-based cybersecurity platform formerly known as OpenDNS—also revealed a few surprises about today’s threat landscape.
Read post
The same blockchain technology that can enhance security for cryptocurrency could also revolutionize cybersecurity, according to the Cloud Security Alliance. Here’s our take from the recent SecTOR IT security conference in Toronto.
Read post
If you’re trying to shift your existing technology to the cloud and patch it like a quilt, stop right there. Instead, follow these key takeaways from SecTor about managing security and compliance gaps in enterprise cloud environments.
Read post
Zero Trust isn’t a product or a solution; it’s a philosophy and a strategy around cybersecurity that demands inward reflection. We look at how it works, the pros and cons of this approach, and why it may — or may not — be the right fit for your organization.
Read post
More people are working remotely these days, but malicious actors aren’t taking a break — so we can never fully let our guard down when it comes to digital security.
Read post
When the Wi-Fi Alliance — a global consortium of industry players — recently unveiled this new standard, safer public Wi-Fi was just one of the benefits it touted. Here are more details on that and other major features of WPA3.
Read post
IT pros can expect to deal with an increasing number of cyber extortion and IoT attacks over the next three years, according to Ponemon’s latest research. Here’s why cybersecurity must move beyond prevention and embrace a broader approach.
Read post
Cisco’s latest cybersecurity report is hot off the presses, packed with details on how malware is becoming more sophisticated and attackers more evasive. Here’s a wrap-up of the report’s findings on new (and old) cyber threats, and how to prepare for what’s ahead.
Read post
Although more CISOs now have a seat at the table, what they do once they get there varies dramatically. At a recent ITAC event in Toronto, Cisco’s CISO explained how to work with line-of-business managers, make security a priority and cut internal vulnerabilities.
Read post
Fraudulent surveys, which pop up onto your computer screen and appear to come from your ISP, are becoming more commonplace. Not only are these annoying, but they carry other risks such as malware. Here’s what you can do if it happens to you.
Read post
Most breach post-mortems focus on the granular reasons a hack took place but don’t explore the systemic cultural issues within an organization that allowed the breach to happen, according to a panel of security experts at last month’s SecTOR conference in Toronto.
Read post
IT security can feel like a never-ending battle — and enterprises are responding by throwing money at the problem. But Jamie Hari, Zayo’s director of cloud and security, challenges that notion at SecTOR with tips to move your security maturity forward at little cost.
Read post
Organizations can never get a 100 per cent guarantee of cloud security, but there are a few things they can — and should — be doing when evaluating third-party services. Research firm Gartner offers up some helpful recommendations.
Read post
Cisco’s 2017 Midyear Cybersecurity Report says destruction of service attacks could leave organizations without a backup to restore systems after an attack. But it also points to a resurgence in traditional attacks, like adware and spyware, as well as a social engineering attack that may be more...
Read post
Conventional methods of protecting information resources aren’t going to cut it in a world of IoT and AI. A Gartner expert explains why we need to rethink our approach to security and risk management, and how to create a more resilient digital business infrastructure.
Read post
The three A’s — artificial intelligence, algorithms and automation — are game-changers when it comes to cybersecurity. But that doesn’t mean we should rely too heavily on AI (or on any one particular technology) in the fight against hackers and cyber attackers.
Read post