When you’re ready to go home at the end of your working day, I have no doubt that you carefully lock up and secure your business’ premises and, in all likelihood, set your alarm system so it will detect any…
Read more
With organizations increasing their spending on cyber security every year – particularly in the mobile and cloud domains – why are security breaches and data thefts so often in the news? According to security research firm Mandiant, 63% of breaches…
Read more
Major data breaches are on the rise. Last summer, a Russian crime ring stole 1.2 billion username and password combinations and half a billion email addresses from various organizations around the world. According to a 2014 study by the Ponemon…
Read more
Enterprise decision makers often ask me what process they should follow to budget for security. While most mature organizations use one or more of the common approaches, the changing security landscape justifies their quest in looking for a new perspective….
Read more
It was a stupid mistake that almost cost me dearly. One morning this summer, I was headed into Toronto on a Via Rail train, using the on-board Wi-Fi to catch up on some reading and e-mails on my iPad. As…
Read more
Even the Pentagon isn’t immune to data breaches. Julian Assange, Chelsea Manning, and Edward Snowden are now either in exile, in prison or incommunicado: Assange is holed up in the Ecuadorean embassy in London, Manning (formerly known as Bradley) is…
Read more
So you’ve drawn up an IT security budget, sized up the weak spots in your network and taken preventive action to protect your business from data breaches and cyber-threats. Your IT security strategy is complete now, right? Wrong. Since no…
Read more