Please turn on your JavaScript for this page to function normally.
Businessman
Security awareness is good, but good security culture is better

As an efficient mechanism to influence employee behavior, security culture is one of the most important, yet most overlooked, aspects of organizational security. “A …

defend
Three cybersecurity threat trends that organizations should address today

The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on …

World Password Day
World Password Day: Make the Internet a more secure place

Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …

crowd
Making security everybody’s business goes beyond strong passwords

One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …

lips
Battling cyber security’s human condition

There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …

mobile device
Data security and mobile devices: How to make it work

There has been a lot of hype in the media about messaging tools. But recently, some of the headlines have taken a negative turn. Just last month, we read how a London-based …

smart hospitals, healthcare
How to securely deploy medical devices within a healthcare facility

The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt patients forever. A surgical …

talk speak speaker
Industry reactions to the Verizon 2017 Data Breach Investigations Report

Nearly 2,000 breaches were analyzed in this year’s Verizon 2017 Data Breach Investigations Report and more than 300 were espionage-related. Here are some of the comments Help …

Android unlocked
How secure are mobile banking apps?

Do banking institutions have a good handle on the things they need to remediate and new control layers they need to adopt to keep users secure? To answer those questions, …

Globe
Behavioural profiling: Spotting the signs of cyber attacks and misuse

Behavioural profiling is increasingly recognised as a new level of protection against cyber attacks and systems abuse, offering the potential to pick out new and unknown …

danger
An untold cost of ransomware: It will change how you operate

Ransomware is unfortunately an IT reality. With the complexity and frequency of attacks, there is a good chance you or someone you know has been impacted. Many victims …

People
Security and the human factor: Creating a positive user experience

Despite the myriad of security solutions deployed, breaches are still happening. Even with the most robust security solutions it seems that we’re failing with the …

Don't miss

Cybersecurity news