Advertisement
Top

Tag: businesses


Editorial, Network security

Network monitoring tools: take a walk down this lane for some of the best options

July 6, 2016

Via: Russel Howards

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The […]


Cloud security

Cloud-first is replacing the defensive no-cloud stance

June 24, 2016

Via: Help Net Security

By 2020, a corporate “no-cloud” policy will be as rare as a “no-Internet” policy is today, according to Gartner. Cloud-first, and even cloud-only, is replacing the defensive no-cloud stance that dominated many large providers in recent years. Today, most provider […]


Vulnerabilities

To Demonstrate ROI for Cyber Situational Awareness, Consider the Incident

May 16, 2016

Via: Security Week

Security is now a topic on many board meeting agendas. Board members need to understand what threats they face, if they are prepared to stop them, and what additional security investments they need to make to better protect themselves from […]


Cyber warfare

8 cyber security technologies Homeland Security is trying to commercialize

April 18, 2016

Via: CSO Online

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products. In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS […]


Network security

Security vs SaaS: The SMB Dilemma

March 30, 2016

Via: TrendMicro Blog

As the SMB marketplace evolves and becomes more competitive, businesses are looking for ways to reduce costs, improve worker productivity, and create new, sustainable business models that not only protect their existing customer base from being encroached on by competitors […]


Access control, Privacy protection

Businesses fail to take full advantage of encryption technology

January 21, 2016

Via: Help Net Security

Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of their customer data seriously, employees are not protected to the same level, according to a new Sophos […]


Wireless security

Wi-Fi and security are better together for SMBs

January 11, 2016

Via: Help Net Security

Wireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go. As a small to mid-sized business (SMB), you may be considering or already offering Wi-Fi as a […]


Cloud security

Lack of visibility and security concerns hinder cloud adoption

December 2, 2015

Via: Help Net Security

When it comes to migrating to the cloud, 65% of companies are concerned with security and 40% worry about their loss of physical control over data in the cloud. In particular, 69% of companies are afraid that migration to the […]


Data loss

4 common errors that businesses make after a data breach

September 20, 2015

Via: data-loss

A few months ago on this blog we raised the basic points that you should think about when confronted with a cyber-attack. Unfortunately the general reaction of some companies is very different to this – here we present to you […]


Hacker

Under DDoS attack? Look for something worse

September 18, 2015

Via: hacker

When #businesses are hit by noticeable distributed denial-of-service #attacks, three-quarters of the time those attacks are accompanied by another security incident, according to #kaspersky Lab. Those other attacks may or may not originate from the same party, but they can […]


Hacker

4 new cybercrime trends threaten your business

September 8, 2015

Via: hacker

The more things change, the more things stay the same — at least for hackers. That’s one of the finding in #proofpoint‘s mid-year threat report on the #attacks of choice for the first half of #2015. In addition to the […]


Phishing

The top 10 phishing lures of 2015

July 19, 2015

Via: phishing

Years after they were first used to catch out unwary users, simple phishing scams sent via email are both common and effective. On the face of it this is surprising. Businesses installed email-filtering gateways a decade ago, some even investing […]


Privacy protection

Stronger data protection rules for Europe

June 15, 2015

Via: privacy-protection

More than 90% of Europeans are concerned about mobile apps collecting their data without their consent. Today, an important step was taken to finalize EU data protection rules to help restore that confidence. Ministers in the Council reached a General […]