Cyber Risk Assessment Approaches: Quantitative vs. Qualitative

The difference between qualitative and quantitative risk assessments for IT security

Cybersecurity risk management is a critical process that can help your organization reduce its exposure to persistent cyber threats. It effectively prioritizes your organization’s cyber risk concerns by identifying and addressing threats based on the potential impact each threat may pose. According to a 2022 cyberbreach study, the average number of cyberattacks and data breaches … Read more

The Evolution of Ransomware

Image of ransomware on a screen

Ransomware has plagued its victims for decades, starting as early as 1989 with the first documented ransomware known as the “AIDS Trojan.” The use of ransomware scams has grown internationally ever since as Internet and email has been deeply embedded in our way of life. Traditionally, ransomware has been defined as a bad actor (a … Read more

Top Cybersecurity Challenges in Healthcare

data breach in healthcare from ransomware

As an industry, healthcare is an appealing target for cybercriminals. Healthcare organizations are particularly targeted by, and vulnerable to, cyberattacks because they possess enormous amounts of information that hold high monetary and intelligence worth for thieves. This includes patient-protected health information (PHI) like prescriptions and test results and personal identifying information (PII) such as social … Read more

The Benefits of SASE

graphic representation of Secure Access Security Edge (SASE)

Secure Access Service Edge (SASE), pronounced “sassy,” is a network architecture that merges software-defined wide area networking (SD-WAN) and network security, such as cloud access security broker (CASB), firewalls and zero trust network access, to create a single, unified cloud service. This emerging technology framework is a single management solution that embeds security into the … Read more

Keeping First Responders Connected with Wireless Networking

First responder with IoT device

While you may typically correlate wireless connectivity with collaboration solutions for hybrid office work, distanced learning and more following the COVID-19 pandemic, the increased volume of wireless broadband networking is critical for first responders whether police officers, emergency medical services (EMS) or firefighters. Let’s take a look at the needs mobile 4G LTE and 5G … Read more

Building a Ransomware Recovery Strategy

Building a Ransomware Recovery Strategy with Rubrik

A ransomware attack can blindside an organization and potentially cause long-term and permanent damage. According to research, ransomware demands could exceed $1.4 billion in the U.S. in 2021. Typically, ransomware spreads via spam, phishing emails or websites. Today, ransomware can be divided into two main types: crypto ransomware and locker ransomware. Crypto ransomware encrypts files … Read more

New Year, New Tech: HP Dragonfly

HP Elite Dragonfly

Image by HP For many around the world, the global pandemic has caused a lasting shift to remote working. According to a recent survey by Upwork, one in four Americans will be working remotely in 2021. It is also projected that 36.2 million Americans will be working remotely by 2025, which means how we work … Read more

Security vs. Compliance: Do You Know the Difference?

The terms security and compliance are often used interchangeably; however, this is a dangerous misconception because an organization can be compliant but not necessarily secure. The goal of any IT department should be to establish a complete security program while meeting compliance obligations within the plan. To accomplish that goal, you must first establish the … Read more

Protect Your Business With Better Passwords and Greater Login Security

In today’s online world, the traditional “username and password” authentication approach to account security can often present an easy point of access for cyber criminals – leaving personally identifiable and financial data vulnerable. In just March and April of this year, IMB X-Force observed a more than 6,000% increase in COVID-related phishing attempts. As phishing … Read more

5 IT Trends Likely to Stick Around Long After COVID-19

Learning the ropes of his industry through first-hand experience

The COVID-19 pandemic has demonstrated how necessary digital technology and transformation is for allowing business and personal life to continue and will have a long-term impact how we all more forward from here. Remote work and social distancing have heightened our dependence on technology and accelerated trends in IT. While we hope much of the … Read more