hello again

Tag Archives: Should

#cybersecurity | #hackerspace | Why PAM Should Be a CISO’s Top Priority

Source: National Cyber Security – Produced By Gregory Evans Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an appropriate level of privileged access controls, PAM helps organizations condense their organization’s attack surface […]

Cybersecurity #101 for #Manufacturers: Why Should You #Care?

Source: National Cyber Security – Produced By Gregory Evans Anyone living through today’s news cycle who does not recognize cybersecurity as an issue is simply not paying attention. But, until recently, most manufacturing companies have considered it someone else’s issue. Most reported cyber incidents have been aimed at acquiring large caches of consumer data (think […]

Why You Should Gamify Your Cybersecurity Training

Source: National Cyber Security – Produced By Gregory Evans With big data breaches occurring almost weekly, companies are looking for ways to tighten up their cybersecurity training. Information security risks continue to evolve, and employees must be educated on the latest security vulnerabilities and encouraged to adapt their behaviors to address such exposures. The latest […]

For Cybersecurity, Independent Contractors Should Think Like Big Businesses

Source: National Cyber Security – Produced By Gregory Evans The cyber insurance market is expected to grow, by a lot. Researchers at PricewaterhouseCoopers predicted in 2015 that the market would hit $7.5 billion in annual premiums by the end of the decade (and at least $5 billion by next year). With recent high-profile attacks like […]

Strengthening cybersecurity should not compromise healthcare delivery

Source: National Cyber Security – Produced By Gregory Evans Within the past few months, hospitals across the world have suffered from cyber attacks, resulting in massive data breaches and workflow stagnancy. The enhanced interoperability of electronic health records (EHRs) and medical devices is increasing the efficiency of healthcare delivery and providing greater access to patients. […]

Your Company Has Been Hacked; Should You Call the Government?

Source: National Cyber Security – Produced By Gregory Evans U.S. companies’ vulnerability to data security incidents through computer hacking has garnered unprecedented public awareness in the last 12 months. Given our increasing volume of user data generated in business and its significant value, hacking will remain a common feature in the data landscape. In one […]

Should your business hire a hacker?

Source: National Cyber Security – Produced By Gregory Evans Chris Pogue was given the Tech Express treatment by CBR’s Ellie Burns, with the Nuix CISO looking into the recruitment of hackers. EB: Why would a company want to hire a hacker? CP: It’s well-known across the board that there is a shortage in cyber security […]

5 things marketers should do today to reduce their cybersecurity risk

Source: National Cyber Security – Produced By Gregory Evans RSA’s chief marketing officer talks about why marketers are now in the business of IT security and how to minimise risk in the face of digital marketing transformation Marketers must … The post 5 things marketers should do today to reduce their cybersecurity risk appeared first […]

Why cybersecurity should be important to hospitals

Source: National Cyber Security – Produced By Gregory Evans The rise of digitization in healthcare, heavily fueled in the U.S. in recent years by incentives of the outgoing administration, has brought an unintended and treacherous side-effect: vulnerability to the increasingly rampant hacking of healthcare data. Hackers have found numerous … The post Why cybersecurity should […]

Every MSP should know about today’s Cyber-security landscape

Source: National Cyber Security – Produced By Gregory Evans It seems like everyone is offering cloud services of every flavor these days, with new players joining the market every day. Over the past 10 years, we’ve seen cloud-based storage, email migration; remote monitoring, online productivity, and cloud security take center stage. Managed Service Providers (MSPs) […]

Experts: Toddlers should be taught cyber security

  A Missouri-based cyber-crime prevention network is advising parents to start teaching their children about cyber security from the time the kids are toddlers. Savvycyberkids.org says children are beginning to use technology at an increasingly younger age, so experts say privacy, bullying protection and online safety should be taught along with the ABCs and 1-2-3s. However, cyber safety education is […]

The 5 Deadly Clicks: The Links You Should Never Touch

  Here’s a scary scenario. You’re innocently surfing the Web, maybe on an unfamiliar site, not paying close attention. Suddenly your computer screen fills with illegal pornographic images of minors. You try to navigate away, but a warning screen branded by the National Security Administration’s Internet Surveillance Program pops up with the message: “Your computer […]