cyber risk

Security and compliance gaps of ineffective employee onboarding and offboarding
There are significant gaps in the compliant management of employee resources throughout the employment lifecycle. Just 15% of employees have all the resources they require to …

49% of infosec pros are awake at night worrying about their organization’s cybersecurity
Six in every ten businesses have experienced a breach in either in the last three years. At least a third of infosec professionals (36%) whose employers had not recently been …

Cyber risks are the top concern among businesses of all sizes
Cyber risks are the top concern among businesses of all sizes for the first time since the Travelers Companies’ survey began in 2014. Of the 1,200 business leaders who …

Assessing risk: Measuring the health of your infosec environment
There is an uncomfortable truth that many organizations are not conducting comprehensive assessments of their information security risk; or those that do aren’t getting much …

Email is an open door for malicious actors looking to exploit businesses
There’s an alarming scale of risks businesses are up against in a time when email is proving an open door for cybercriminals and malicious actors looking to disrupt, …

A proactive approach to cybersecurity requires the right tools, not more tools
The key challenge facing security leaders and putting their organizations at risk of breach is misplaced confidence that the abundance of technology investments they have made …

How organizations view and manage cyber risk
Amid a wider range of issues to handle, a majority of board members and senior executives responsible for their organization’s cyber risk management had less than a day in the …

Only 15% of organizations can recover from a severe data loss within an hour
There’s a global concern about the business impact and risk from rampant and unrestricted data growth, StorageCraft research reveals. It also shows that the IT …

Threat visibility is imperative, but it’s even more essential to act
Cyberthreats are escalating faster than many organizations can identify, block and mitigate them. Visibility into the expanding threat landscape is imperative, but according …

SMBs show no improvement in IT maturity levels, security remains top concern
IT groups at small and midsize businesses (SMBs) show no improvement in IT maturity levels in three years, while security remains top concern, a Kaseya survey reveals. Based …

Should social media organizations be subject to strict privacy regulation?
80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, …

Supply chain security: Five IT strategies for choosing vendors wisely
With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside …