cybersecurity
TagWhat Not to Do After a Data Breach
In this article, I will discuss what companies should avoid doing once they realize their systems have been breached.
The Behavioral Economics of Why Executives Underinvest in Cybersecurity
Determining the ROI for any cybersecurity investment, from staff training to AI-enabled authentication managers, can best be described as ..
How to Protect Yourself From Ransomware
Security pros recommend opting for recent operating systems, paying attention to software patches, and backing up your files.
The Best Cybersecurity Investment You Can Make Is Better Training
As the scale and complexity of the cyber threat landscape is revealed, so too is the general lack of cybersecurity readiness in organizati..
Why installing software updates makes us WannaCry
All people had to do to stay safe from the global WannaCry ransomware attack was update their software. But people often don’t, for a numb..
Boards Neglect Cybersecurity at Their Companies’ Peril
The average breach costs around $4 million.
The C-Suite and IT Need to Get on the Same Page on Cybersecurity
A recently published global survey of C-Suite level executives and IT Decision Makers (ITDMs) revealed a large gap in assessments of cyber..
Site Hacks Are Up 32 Percent, Here’s How Small Business Owners Can Respond
A couple of weeks ago, Google released a year in review regarding the State of Website Security in 2016. The report opened with the follow..
8 Ways Governments Can Improve Their Cybersecurity
It’s hard to find a major cyberattack over the last five years where identity — generally a compromised password — did not provide the vec..
Computer security is broken from top to bottom
Annoyed by the parlous state of computer security, he had, he claimed, decided to perform a public service by demonstrating just how easy ..