Business

Not us, YOU: vendor email compromise explained - Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.
SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath - We take a look at the top challenges and threats to SMBs today, and recommend ways they can easily shore up their defenses.
Pulse VPN patched their vulnerability, but businesses are trailing behind - After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What's up?
Why all organizations must better protect sensitive data - The truth is that companies, businesses, and organizations have an obligation to the data that belongs to their employees, users, and customers. For some organizations, that obligation is a matter of real, physical safety.
Securing the managed service provider (MSP) - Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.
What role does data destruction play in cybersecurity? - Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.
When corporate communications look like a phish - Before organizations engage in gnashing of teeth over the
5 simple steps to securing your remote employees - Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.
Making the case: How to get the board to invest in higher education cybersecurity - CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Select your language