Since many enterprises are still fine-tuning their collaboration setup, panelists at Enterprise Connect concurred that many questions about collaboration security simply do not have definitive answers yet. Here are highlights from the discussion around three of those questions.
Read post
As part of our Future of Work 360 series, Allstream talks with Cisco’s Joey LeMonier and Dan Mathews, along with Allstream’s Steve Fisher and Matt Waldo, about tools and techniques for improving operational productivity in the new world of hybrid work.
Read post
Cybersecurity that leans heavily on the physical location of workers and enterprise assets doesn’t cut it anymore. While zero trust isn’t a brand new concept, it’s gaining new popularity as freshly enabled hybrid workplaces search for alternatives to location-based cybersecurity.
Read post
From cloud firewalls to blockchain, technology creates a foundational layer for building a culture of cybersecurity in financial services firms—at a time when the industry is digitizing services, adopting cloud and transforming the traditional banking model.
Read post
The mass exodus of workers from office to home has contributed to the rise of ransomware. Attackers are setting their sights on the private sector and asking for more money, with the average ransom demand now topping $10 million.
Read post
Even if you were already shoring up your defences — systems, networks and devices, in the office and remotely — the pandemic pushed this to the top of the IT security agenda with an unprecedented urgency. We look at what organizations can expect in the year ahead.
Read post
The top IT security projects identified by Gartner for 2021 reflect the incredible amount of change brought on by COVID-19: They’re heavily focused on process and risk management — and often require thinking beyond the technical aspects to consider the broader business.
Read post
Many companies are turning to Zero Trust to deal with a darkening cybersecurity landscape. But its successful adoption hinges on employee buy-in and behaviour — at a time when remote work is viewed as one of the biggest challenges to enterprise security.
Read post
The number of cyber attacks on IoT devices is soaring, in part due to COVID-19 — and this will only increase as 5G is rolled out. We look at some of today’s biggest malware threats, how COVID-19 plays a role and how to protect employees who are working from home.
Read post
Pandemic-related vulnerabilities, including home-based workforces and mobile WFH devices, have left big gaps in security. And evolving cyber attacks — like blended extortion-ransomware — mean that organizations can’t afford to let their guard down.
Read post
Since mid-March, we’ve seen an increase in the volume and scope of cybersecurity attacks as employees working from home and transitioning back to the office present a tempting target for malicious actors. This could change the way your business evaluates risk for years to come.
Read post
Working from home puts our workplace data and networks at greater risk of being infected by virtual threats like malware, spyware and ransomware. We talk to a security pro for tips on how enterprises can protect their networks while enabling WFH during the pandemic.
Read post
While it’s no surprise that malicious traffic has skyrocketed during the first nine months of this year, research from Cisco Umbrella—the cloud-based cybersecurity platform formerly known as OpenDNS—also revealed a few surprises about today’s threat landscape.
Read post
The same blockchain technology that can enhance security for cryptocurrency could also revolutionize cybersecurity, according to the Cloud Security Alliance. Here’s our take from the recent SecTOR IT security conference in Toronto.
Read post
Cisco’s latest cybersecurity report is hot off the presses, packed with details on how malware is becoming more sophisticated and attackers more evasive. Here’s a wrap-up of the report’s findings on new (and old) cyber threats, and how to prepare for what’s ahead.
Read post
The three A’s — artificial intelligence, algorithms and automation — are game-changers when it comes to cybersecurity. But that doesn’t mean we should rely too heavily on AI (or on any one particular technology) in the fight against hackers and cyber attackers.
Read post
Our monthly roundup of the best discussions in the online community, from the threat landscape in 2017 to admissions of guilt over poor password policies.
Read post
It’s not that corporate cybersecurity teams aren’t looking hard enough for threats and breaches, according to a survey by Accenture. It’s that they’re not looking in the right place.
Read post
Building an IT-based border to keep the bad stuff out just isn’t possible anymore, according to panelists at the Canadian Telecom Summit held in Toronto earlier this month. Here’s why attitudes — and approaches — toward security need to change.
Read post
Today’s hackers are sophisticated, and it’s becoming harder for organizations to stay one step ahead of attacks. This is why SearchSecurity.com has created an Essential Guide to dealing with advanced threats. The guide explains which threats are changing the fastest and offers advice on how to...
Read post
Today’s IP news roundup highlights some of the latest headlines in network security, virtualization and more:
Cyberattack attempts against critical infrastructure increase, yet many organizations still use default passwords on Internet-connected devices. According to the US Department of...
Read post
A sergeant with Ottawa’s high-tech crimes unit explains the limits of what law enforcement officials can do to contend with IT security issues, and why DDoS attackers won’t give up easily
Read post
As attacks become more sophisticated, organizations must use more advanced intelligence to protect themselves from threats. A Solarwinds white paper provides an overview of the latest types of attacks and offers a framework for ensuring that you are protected from even the most sophisticated of...
Read post
Welcome to today’s edition of the IP news roundup. Here are the latest headlines in cybersecurity, big data and more:
President Obama signed an order that requires federal agencies to share cyberthreat information with businesses as well as build a security framework that will help protect...
Read post
As DDoS becomes a favourite of everyone from script-kiddies to nation states, we look at five noteworthy attacks.
Read post