Your 6-Step Blueprint for Preparing the IT Security Budget

You probably look forward to preparing a budget about as much as a root canal. The budget process pulls you away from core business activities, and it often creates stress and tension as difficult decisions are made. The IT budget in particular…

Why Shadow IT Is Getting Worse, and What You Can Do about It

Shadow IT is a growing problem, especially with the emergence of the cloud. Users can easily obtain cloud services simply by filling out a form and entering a credit card number. In fact, Gartner estimates that shadow IT comprises 30 percent…

Is Your Firewall Able to Protect against the Latest Threats?

Your business depends upon Internet connectivity to exchange information and access cloud services. Hackers rely on the Internet, too, as a means of distributing malware, stealing sensitive data and engaging in other malicious activity. Your…

Business Email Compromise Costs Companies Billions and Brings Potential Legal Liability

In a recent post, we noted that 87 percent of IT decision-makers and C-level executives surveyed recently reported seeing email impersonation attacks that asked the recipient to wire money. These kinds of attacks, known as “business email…

The Facebook Hack: What Happened and Why Businesses Should Be Concerned

Here’s the latest on the Facebook hack that compromised 30 million user accounts, down from the original estimate of 50 million. Three vulnerabilities in Facebook’s “View as” feature, which allows users to see their profiles as other…

The Growing Threat of DDoS Attack and What to Do about It

A new report from Corero finds that distributed denial of service (DDoS) attacks are on the rise. In a DDoS attack, hackers flood networks with illegitimate traffic in order to sap bandwidth and prevent legitimate users from accessing computer…