Storage Is Your Data Lifecycle Weak Spot
Privacy regulations have put more emphasis on data security. When we talk about data security and privacy, it’s often discussed as though the protection covers everything equally. But all data isn’t equal; it needs to be treated differently in each stage of the life cycle—creation, storage, usage, sharing, archiving and ... Read More
How Personality Influences Cybersecurity Behavior
In August 2019, ESET and The Myers-Briggs Company released preliminary findings of a fascinating study on the way personality types can influence cybersecurity behaviors. With just a snippet of the data available, it was possible that security awareness training could be designed around an individual employee’s personality, increasing the chances ... Read More
Companies Don’t Trust Themselves With Zero Trust
Zero trust may be an ideal solution to an increasingly porous cybersecurity approach. So why aren’t more organizations trusting? Cybersecurity seems to be in the middle of a perfect storm. Data breaches and other cyberthreats are on the rise. The number of endpoints accessing the network is skyrocketing. Users are ... Read More
What We Can Learn From Cyber Resilient Leaders
What separates those organizations that are cyber resilient and those that aren’t? Accenture’s study tells us Organizations are spending a lot on their cybersecurity systems, so it makes sense that they think they are well-protected from cyberattacks. And they are getting better at cyber resiliency and preventing direct attacks. It’s ... Read More
Your Smartphone: Ground Zero for Cyberattacks
Your network was hacked. You search to find the vulnerability that led to the hack. Here’s a tip that might expedite that investigation: start with the mobile phones connected to your network. With increasing frequency, smartphones are ground zero for cyberattacks, but too often they are ignored as a source ... Read More
Survey: SMBs Plan to Embrace AI but Don’t Know the Risks
Is 2020 the year that AI technology takes hold in SMBs? According to a study from Zix-AppRiver, the answer is yes. Nearly 9 out of 10 SMBs report they have a high interest in adopting AI this year; for businesses with more than 150 employees, the interest in AI jumps ... Read More
Security Pros Offer Best Bangs for 2020 Budget
How best to utilize your 2020 security budget? Here are a few recommendations from those in the know The new year is a chance for a fresh start, and for many organizations, that fresh start comes with a new budget and spending agendas. According to research by IDC, businesses spent ... Read More
Cloud Misconfigurations: The Security Problem Coming From Inside IT
Cloud misconfigurations are becoming a major security risk among organizations using public clouds The need for smart cybersecurity never gets a holiday. That was made clear in December, a time when many organizations slow down production or close shop for a few days, when several high-profile data breaches were announced ... Read More
Deepfakes Pose New Security Challenges
Expect to hear a lot about deepfakes in 2020. It’s not that manipulating images is anything new, but with technology advantages and the increasing use of biometrics as an authentication tool, deepfakes will impact cybersecurity efforts. For example, cybercriminals are now perfecting deepfakes to impersonate people to steal money and ... Read More
Best of 2019: End-of-Life Devices Pose Data Breach Risk
As we close out 2019, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the third in our weeklong series of the Best of 2019. End-of-life devices not properly sanitized of data can cause compliance issues and make corporate data vulnerable GDPR, ... Read More
