IDG Contributor Network: Who you gonna call?: Getting ready for the next cyber disaster

Credit to Author: Sandra Henry-Stocker| Date: Fri, 19 May 2017 06:03:00 -0700

Are you ready for the next cyber disaster? You may not ever be fully ready. Given the ever-increasing number and variety of threats out there, it’s hard to imagine the many ways in which you could be hit. Twenty years ago, who would have imagined 9/11 or ransomware or the sophistication of today’s social engineering techniques? But even if you can’t be fully prepared, you can avoid being totally unprepared.

There are many things that you can do to be more likely to recover from a major attack or limit how hard it hits you. Being more in touch, more aware, and more prepared are key. Given the proliferation and variety of the threats today, avoiding disaster is a big deal and limiting impact a worthy goal. What are those who deal these issues everyday trying to tell us and how can we put their insights to good use?

To read this article in full or to leave a comment, please click here

Read more

7 tips to strengthen online security

Credit to Author: Ryan Francis| Date: Wed, 12 Apr 2017 04:00:00 -0700

Seeing the light
online security

Image by Pexels

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily basis, the more we expose ourselves to security risks. This is the nature of how our digital lives have evolved and it requires more active participation as individuals to protect ourselves and minimize exposure.

To read this article in full or to leave a comment, please click here

Read more

How to eliminate insider threats

Insider threats are a major security problem
eliminate insider threats 1

Image by Thinkstock

For years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.

To read this article in full or to leave a comment, please click here

Read more

(Insider Story)

Read more