Tag Archives: business security

Cloudy with a chance of malware

      No Comments on Cloudy with a chance of malware

While overall IT budgets are experiencing minimal growth – a compound annual growth rate of 0.9 percent in 2016 (to $3.4 trillion) – the sky is the limit when it comes to cloud: Cloud infrastructure spending will increase 16.2 percent in 2016 to $37.4 billion, with a 5-year CAGR of 13.6 percent to $60.8 billion in 2020. That’ss just the hardware; public cloud services are expected to reach $208 billion in 2016, up from $178 billion in 2015. Gartner attributes the growth to the fact that organizations are saving 14 percent of their budgets as an outcome of public cloud adoption.

A cybersecurity primer

      No Comments on A cybersecurity primer

History teaches us that everything changes, and that’s particularly true when it comes to cybersecurity where a vulnerability, accidental or malicious, can put a business at risk any time, any where. While cybersecurity must address the core functions — Identify, Protect, Detect, Respond and Recover — in a holistic manner, what are the processes, practices, hardware and software that when combined and integrated together can provide effective cybersecurity? The following is not a definitive list, but it does cover the basics required to better secure your information assets.

Detection: What you don’t know will hurt you

      No Comments on Detection: What you don’t know will hurt you

One of the realities of today’s cybersecurity threatscape is not if you will be breached, but when, and how often. As good as cybersecurity is becoming – i.e. prevention solutions provide a 99.9 percent or higher detection rate for common malware – effective cybersecurity depends upon three pillars –  prevention, detection and resolution – with the latter two required to address those situations where prevention isn’t enough.

Targeting SMBs’ threat tolerance concerns

      No Comments on Targeting SMBs’ threat tolerance concerns

While small and medium businesses don’t appear to be as concerned about their cybersecurity vulnerabilities as they should be – i.e. SMBs are the principal targets of cybercrime and as many as 60 percent of hacked SMBs go out of business after six months – the reality is that the growing and rapidly changing threatscape and limited resources are driving them to outside help to protect their businesses. That protection can include assessments, remote monitoring and management, and backup and disaster recovery, but one way to stand out from the competition is to focus on their risk tolerances and customize your offerings to their individual risk appetites.

Prevention: One-Third Of A Healthy Cybersecurity Regimen

Whether internal or external, accidental or malicious, the cybersecurity threatscape is huge and growing, but successfully protecting your information, and your business, is not as difficult as you might think. 

In the first of a three-part series, I’ll address how a framework consisting of these three pillars provides the basics for effective cybersecurity.

Ransomware attacks hotel computer and keycard system

The Romantik Seehotel Jäger, sitting serenly for 111 years in the picturesque Austrian Alps, fell victim to a ransomware attack. At the height of the winter ski season, cybercriminals took control of the hotel’s computer system and demanded $1,603 in bitcoins to release reservations and the system to program electronic keys used by guests to access their rooms.