General

General

10 Small Business Cyber Security Statistics That You Should Know – And How To Improve Them

All enterprises have to handle customer data, including PII, but often small businesses do not have the resources to effectively safeguard against cyber threats.

In the latest Cybersecurity Magazine article, Ashley Lukehart offers 10 important cybersecurity statistics regarding the reality of cyberattacks on small businesses, and gives some tips on how small businesses should approach cybersecurity attack prevention

Read More
General

Zero Trust Security Best Practices

Since the start of the COVID19 pandemic, enterprises worldwide have adopted the work-from-home model. This shift has resulted in an increase in cyberattacks, and some traditional models of security are becoming ineffective as employees increasingly access resources remotely and use personal devices.
In the latest Cybersecurity Magazine article, Varin Khera argues for the use of ‘zero-trust’ security models and examines the best practices for adopting such a model.

Read More
General

Hybrid and Multi Cloud Security

The latest article from Cybersecurity Magazine is the first in a two-part series looking at the challenges faced by cybersecurity professionals when clients are using multiple clouds as well as local infrastructure to run their business.
In this first article, Tom Madsen focusses on the various challenges in this environment.

Read More
General

Identity Management Day: the meaning, the importance and the benefits of cyber security

Today is the first-ever Identity Management Day, created to raise awareness, educate and engage business leaders and IT decision makers on cyber security and identity management.
Anurag Kahol, Bitglass, Art Gilliland, Centrify, Ralph Pisani, Exabeam, and Gary Cheetham, CISO at Content Guru, give their insights into why this day was created and what businesses can do to evolve their security landscape and protect their organisation.

Read More
General

Why effective preparation is the key to acing client data protection audits

In many countries, authorities are now recommending or even requiring that major corporations do complete security audits of their third-party vendors. For this, preparation is the key to success. In the latest article from Cybersecurity Magazine, Tim Bandos looks at eight of the most commonly asked audit questions, giving advice on how to be audit ready and make any changes or improvements to data protection programs before it’s too late.

Read More