Finding the right mix: Leveraging policy and incentives to improve healthcare cybersecurity
When businesses are hit by a cyberattack, it can mean a disruption in operations, lost revenue and customer dissatisfaction because their personal information is exposed. But …
Policy and patience key in Biden’s cybersecurity battle
Last month, President Biden hosted a group of technology and insurance executives to build support for a “whole-of-nation effort” to improve cybersecurity. The executive …
The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowlege
The growing number of ransomware attacks has burdened many oganizations, but it has also greatly impacted the cyber insurance industry, which found itself having to cover …
How to foster collaboration with the IT team for a successful zero trust implementation
The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …
How to balance employee IT security policies
Hysolate announced the release of its latest enterprise security study exploring 200 enterprise IT and security leaders’ views on enterprise priorities for ensuring secure …
54% of businesses now have a policy in place to deal with ransomware attacks
54% of businesses now have a defined policy in place to deal with ransomware attacks – whether this means paying a ransom, relying on insurance policies or refusing to pay at …
Employers permanently moving to a more flexible work model
Research conducted by Owl Labs, which polled 2000 business leaders based in the UK, Germany, France, and the Nordics shows that just 11% of business leaders expect their …
Organizations leveraging Microsoft Teams exposed to potential risk
A survey conducted by Exec Survey and iGov Survey, reveals how over 200 unique organizations in the U.K. enabled seamless business continuity amid rapid societal change, where …
How can companies prioritize contact center security?
Security is front of mind for a lot of organizations these days, especially due to the 400% increase in cyberattacks since the pandemic started. Notable and alarming attacks …
IT service desks lacking user verification policy, putting businesses at risk
48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …
Data growth as the number one storage management challenge
Datadobi released a report by 451 Research which reveals the major impact that data growth is having on storage management, highlighting the rise in retention of unstructured …
CAM sector cybersecurity challenges and how to mitigate them
ENISA discloses an in-depth analysis of the cybersecurity challenges faced by the connected and automated mobility (CAM) sector and provides actionable recommendations to …
Featured news
Sponsored
Don't miss
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
- Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
- Who owns customer identity?
- Enterprises face significant losses from mobile fraud
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation