Cybersecurity criminals are becoming increasingly sophisticated, and cyber threats continue to grow in size and impact. 2021 saw a breathtakingly large number of high-profile cyberattacks, ranging from Microsoft Exchange, where the email accounts of 250,000 organizations were compromised globally, to Apple supplier Quanta, which fell prey to a $50 million ransomware attack. Other victims included Colonial […]
Category: Cybersecurity
The media warns us that cybercriminals are learning how to automate attacks, making it easy for them to target hundreds, sometimes thousands of small companies in one fell swoop. These small and medium-sized businesses (SMBs) often have less sophisticated technological defenses, weaker knowledge of current threats, and less time and money to dedicate to cybersecurity. […]
Covid has ushered in a new age of remote working. With no network perimeter and more applications and data in the cloud than ever before, the enterprise is suddenly faced with a wider range of security threats that need to be urgently addressed. This changing environment has inspired a so-called ‘zero-trust’ approach to security encompassing […]
We are living in a golden age of technology right now. Devices and software permeate our everyday lives, from smartphones to computers in our cars to smart home devices like Alexa or Google Home. While each of these machines is useful and practical individually, the best way to enhance your daily life is to merge […]
Sometimes, it can feel like technology is advancing at breakneck speed. Every year it seems like we create a product or service that would have been science fiction a few decades ago. One of the most transformative changes, however, has been the widespread adoption of the cloud. No longer are businesses and other entities tied […]
As the world becomes more and more dependent on technology, there is so much more data out there than ever before. Unfortunately, because we’ve adopted these new tools and systems so quickly, there has been a steep (and expensive) learning curve, particularly when it comes to security. One of the most troubling signs is that […]