Please turn on your JavaScript for this page to function normally.
healthcare ransomware
Healthcare breaches involving ransomware increase year-over-year

2017 has been a very challenging year for healthcare institutions as these organizations remain under sustained attack by cybercriminals that continue to target their …

time
Security pros waste 10 hours a week due to inefficient systems

Process and software inefficiencies play a major role in slowing down an organization’s ability to detect and respond to cyber threats, according to LogRhythm. Over one-third …

fingerprint
Consumers are ready to say goodbye to passwords

A new survey of 1,000 Americans exploring awareness and perceptions of biometric authentication confirms that consumers continue to have a strong interest in new biometric …

files
Examining attitudes towards confidential data

Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of …

Complex regulations and sophisticated cyberattacks inflate non-compliance costs

The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with …

biohazard
Script-based attacks and overall malware on the rise

Research revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that …

Cisco network
Reliability, security and QoS are critical when evaluating networking solutions providers

Reliability, security and quality of service all rank above cost when evaluating networking solutions providers. Spiceworks surveyed U.S.-based IT professionals who have …

hospital
Taking the physician’s pulse on cybersecurity

More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to Accenture and the American Medical Association (AMA). …

IoT
IoT data exchange: Building trust and value

The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or …

USB
Enterprise USB security is outdated and inadequate

While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting …

face
Majority would trust organisations more if they were to use biometrics for authentication

Nearly seven in 10 Europeans (68 percent) said they would trust organisations more if they were to use biometrics for authentication, according to a new Unisys survey. The …

IoT
Security and costs holding back those looking to implement IoT projects

While 94% of IT professionals from organisations that are undertaking Internet of Things (IoT) initiatives say they need to invest in IoT over the next 12 months in order to …

Don't miss

Cybersecurity news