Why Outsmart Cyber Attackers When You Can Remove Them Entirely?

Cyber threat actors have gotten smarter--or lazier--depending on your perspective. It used to be fairlycommon for attackers to spend days or even weeks probing targeted networks for vulnerabilities toexploit. Once identified, they ...
Aimee Laurence

Drastic Cloud Security Mistakes No One Should Make

The post Drastic Cloud Security Mistakes No One Should Make appeared first on CCSI ...

Can’t Trust Anyone

It’s clear that traditional security architectures and philosophies don’t work anymore. In 2018, cybercrime generated $1.5 trillion in revenue for hackers, growing to $6 trillion by 2021. These statistics are even more ...

Real-Time Observations in Security Hygiene

The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and ...

Record GDPR fine provides stark data and payment protection warning to business owners

With reports confirming that British Airways will be fined £183 million by the Information Commissioner’s Office (ICO) following a significant data breach last year, PCI Pal’s CEO James Barham is encouraging businesses ...

ITproportal feature: How penetration testing can help secure your company’s infrastructure

Infrastructure security is a top priority for all IT managers. Organisations must be proactive in locating network vulnerabilities and resolving them, in order to prevent attacks that can cause system downtime, data ...
Columbia Surgical Specialists Pays Almost $15k Ransom Following Ransomware Attack

Columbia Surgical Specialists Pays Almost $15k Ransom Following Ransomware Attack

A ransomware attack on Spokane, Washington-based Columbia Surgical Specialists on Jan. 9 resulted in unauthorized access of medical records of almost 400,000 patients, the healthcare provider said in a press release. Although ...
attacks data breach supply chain healthcare

Preventing Security Breaches Within Company Search Applications

Far too many organizations found their names in headlines during the first month of 2019. Many came after a security researcher discovered a trove of Elasticsearch database misconfigurations that left data exposed ...
Security Boulevard
perimeter security cybersecurity startups

Survey Surfaces Range of Cybersecurity Disconnects

A new survey of 300 IT professionals working in organizations with 100 or more employees conducted by Syncsort, a provider of tools for managing large amounts of data, finds 85 percent are ...
Security Boulevard
Collecting and Storing Private Data

Collecting and Storing Private Data: Limits with No Limits

With big companies entering the healthcare market, the inevitable must be asked: How protected is our private data? What can be done with regards to data privacy and security? Ten Years from ...
Security Boulevard