While small and medium businesses don’t appear to be as concerned about their cybersecurity vulnerabilities as they should be – i.e. SMBs are the principal targets of cybercrime and as many as 60 percent of hacked SMBs go out of business after six months – the reality is that the growing and rapidly changing threatscape and limited resources are driving them to outside help to protect their businesses. That protection can include assessments, remote monitoring and management, and backup and disaster recovery, but one way to stand out from the competition is to focus on their risk tolerances and customize your offerings to their individual risk appetites.
Whether internal or external, accidental or malicious, the cybersecurity threatscape is huge and growing, but successfully protecting your information, and your business, is not as difficult as you might think.
In the first of a three-part series, I’ll address how a framework consisting of these three pillars provides the basics for effective cybersecurity.
In the movie Ghostbusters, the imaginary threats ranged from Psychomagnotheric Slime to the Stay Puft Marshmallow Man and Gozer the Gozerian, armed with slime and a bagful of Hollywood special effects. In the real world, small and medium businesse…
A decade ago the desktop PC was the primary connection to the Internet, and security was a whole lot easier. Fast forward to today and the threatscape has increased exponentially: More devices, more data, more locations, more malware attacks, and less …
The Romantik Seehotel Jäger, sitting serenly for 111 years in the picturesque Austrian Alps, fell victim to a ransomware attack. At the height of the winter ski season, cybercriminals took control of the hotel’s computer system and demanded $1,603 in bitcoins to release reservations and the system to program electronic keys used by guests to access their rooms.
The reason cybersecurity is a process, not a one-time solution, is that the Bad Guys – whether careless or malicious employees, hacktivists, cybercriminals, or rogue governments (not to be confused with the good governments, which only spy on us for ou…
In an information-based economy where bring-your-own devices (BYOD) and, increasingly, bring-your-own applications (BYOA), are the norm, IT groups are struggling to enable their organizations to be fast and flexible while protecting their digital asset…
With the digital threatscape proliferating exponentially – i.e. phishing emails increased almost 800 percent quarter-to-quarter in Q1 2016, to 6.3 million, while ransomware soared 300 percent year-over-year on its way to a billion-dollar-a-year problem – it’s important to remember that effective cybersecurity rests on three pillars – products and services, processes, and people. Simply throwing more money and resources at cybersecurity is not the answer: People are the key, and everybody has a role to play in effective cybersecurity.
“We want to keep our clients and servers in a secure environment.” Business owners in every part of the world have the same concerns. Scott Quinn from Montana-based Caritas Design, a small web-design firm run by Scott and his wife Kate, said, “There are lots of viruses out there you need to be protected from. […]
Last week, we sat down with Alan Scott of the Mid-Valley Literacy Center at Avast’s headquarters. During his time visiting Prague, Alan enjoyed exploring the city and visiting some of its museums in order to escape the (somewhat unexpected) September heat. Located in Keizer, Oregon (USA), the Mid-Valley Literacy Center’s mission is to empower adults […]