Blog 2016-10-27T11:14:07+00:00

Defending Against the Biggest Cybersecurity Threats in the Healthcare Industry

Defending Against the Biggest Cybersecurity Threats in the Healthcare Industry

Healthcare cybersecurity is becoming an increasingly serious topic throughout companies and the public alike. But, what if a data breach meant exposing patients private information and putting that data into the hands of malicious cybercriminals?

That situation is precisely what the Independence Blue Cross (IBC) faced earlier this year. On September 17th, IBC announced that over 17,000 of their customers were affected by a data breach that leaked customers’ names, dates of birth, provider information, diagnoses codes and other data that could be used […]

By | November 19th, 2018|Categories: Security|

How Much Should Your Company Invest in Cybersecurity?

 

The question is simple — what’s the “right” amount of money a small to mid-sized business (SMB) should invest in its cybersecurity infrastructure and policies?

The answer? Well, that’s not so straightforward.

When it comes to protecting both internal, enterprise data as well as those of customers, businesses competing in today’s digital-first world no longer have the luxury of crossing their IT fingers. Over 61 percent of SMBs experienced some form of a cyber attack in 2017. What’s more, 86 percent of businesses surveyed say they feel underprepared regarding their ability to shield and mitigate a […]

By | November 4th, 2018|Categories: Security|

Importance of Cybersecurity Awareness Training for Your Employees

Importance of Cybersecurity Awareness Training for Your Employees

When hackers breached retail giant Target’s databases, they stole the credit and debit card information of more than 40 million customers. It remains one of the largest cybersecurity hacks in history.

Fast forward to today, and 2018 has seen trending news of cybersecurity incidents strike Macy’s, Whole Foods, Delta, Under Armour, Uber, Panera Bread and many, many more. This doesn’t even mention the cybersecurity tsunamis that have come to be synonymous with data-protection failures, network-security lapses or general IT infrastructure mismanagement.

It’s not just the big guys getting […]

By | November 1st, 2018|Categories: Security|

What Is a Security Operations Center, and Why Is It Important?

What is a Security Operations Center (SOC) and Why is it Important?

 

In this age of rapidly advancing technology, businesses big and small must protect sensitive information about their clients, employees, partners, internal operations and more. But with the rising sophistication of cybercriminals and hacking software, this protection has become an increasingly challenging task.

The chances of experiencing a security breach have risen substantially in the last few years. A recent study of businesses in the U.S. found one in four organizations will have their data attacked within a year’s time. The odds of a breach […]

By | October 27th, 2018|Categories: Security|

Best Practices for Cybersecurity Compliance Audits

Best Practices for Cybersecurity Compliance Audits

Like most information technology executives these days, when you hear the words compliance and audit — as the CEO, CFO or general counsel is walking your way — are you thinking, “What is it this time? Am I on the hook for another analysis and report for the queue?”

On any given day, you’ve got at least one request for a deep dive into a system or the information stored within. Yet with the security breaches we now see coming through the Internet, opening our information assets to theft and data corruption, cybersecurity […]

By | April 26th, 2018|Categories: Compliance|

What is a Virtual Security Operations Center?

In today’s world, every business has a target on its back. Whether you’re a small-, mid- or large-sized company, you can guarantee that hackers are targeting you. Due to the rapid rise of data breaches, which cost an average of $3.6 million at the global level, many businesses anticipate one, which is why they’re bolstering their offensive protections. How? With a virtual security operations center, also known as a V-SOC.

What is a V-SOC?

A frequent question of small- to mid-sized businesses — which are the target of more than 40 percent of today’s data breaches — is, “What is a virtual security operations center?” […]

By | April 25th, 2018|Categories: Security|
Request a Demo