Blog

How to achieve compliance in the cloud

Cloud computing simplifies collaboration, application deployment, and data storage. But when it comes to data compliance, the cloud introduces a new level of complexity.

Compliance is a broad topic that covers government initiatives such as the Sarbanes-Oxley Act and HIPAA, as well as industry-created standards like PCI-DSS. These frameworks dictate how organizations should manage and protect data.

Be careful of what you sync to your Office 365 account

With the widespread adoption of cloud computing, security experts are concerned about the growing trend of ransomware in the cloud as well as ransomware on-premise. While ransomware typically holds local devices hostage, advanced strains of malware are targeting cloud-based productivity suites like Office 365 to hit more users working with valuable data.

How to tell whether your systems have been hacked

In the early days of cyberattacks, many hackers were eager to brag about their nefarious achievements by defacing websites or running programs that said “You’ve been owned.” These days, attackers are far more subtle and use a variety of exploitation tools that often take weeks to detect.

2017 Cybersecurity Forecast: Targeted Attacks

Cybercriminals will refine their attack methods. This has been the underlying theme throughout our cybersecurity forecast series.

A few years ago, cyberattacks were automated and usually carried out by amateurs or script kiddies looking to hit a wide range of businesses and individuals.

2017 Cybersecurity Forecast: Data Security Compliance

Installing stringent security measures to protect your data doesn’t just benefit your business financially, it also mitigates legal risks and ensures data compliance. Although data regulations vary from industry to industry, all companies that collect, process, store, and manage sensitive data must ensure that it is protected from cyberattackers.

2017 Cybersecurity Forecast: Cyber Propaganda

In our 2017 cybersecurity series, we’ve discussed a lot of different attack methods used by hackers. Most of the time, these cyberattacks are either financially motivated or a way for hackers to gain notoriety. But this week’s security prediction focuses on threat actors who aim to sway the hearts and minds of the general public by using their talents for cyber propaganda.

2017 Cybersecurity Forecast: BPC Attacks

The definition of breaking into a bank has changed dramatically in recent years. Heists are no longer exclusive to armed robbers and plot points in Hollywood blockbusters. Instead, all it takes to steal tens of millions of dollars is a few cunning hackers who know how to exploit the security vulnerabilities within a financial institution.

2017 Cybersecurity Forecast: Email Attacks

The golden rule of email security is this: If you get an email from someone you don’t recognize, don’t open it. Employees are pretty good at following this rule and keeping an eye out for suspicious hyperlinks and email attachments, ridiculous promotions, and typos.

2017 Cybersecurity Forecast: IoT and targeted attacks

Internet of Things (IoT) devices are becoming more commonplace in enterprises. Smart thermostats, security cameras, lighting systems, and battery backups are just a few of the internet-enabled appliances that help business owners collect data and run their organizations more smoothly.