Blog
By Zachary Comeau
With more of the world relying on technology to connect and maintain business continuity over the last two years, malicious cyber actors have stepped up their game to exploit weaknesses in organizations’ IT infrastructure and conduct a broad range of attacks against both public and private entities. However, network defenders
By Cyrille Badeau
In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, whilst another 85 percent plan on automating them in the next 12 months. Despite the positivity of these statistics, many organizations struggle to change to a more automated
Six Ways To Shrink Your Cyberattack Surface
May 23, 2022
0 Comment
By Barbara Hunt
Traditional networks are fixed, static and easily discovered by adversaries, making them vulnerable to attack. As a result, most enterprise IT infrastructures are constantly being probed by threat actors for vulnerabilities. It’s just a matter of time before they find a way in and you discover that you’ve been breached.
Spring cleaning your data and cybersecurity practices — What small businesses need to know
May 21, 2022
0 Comment
By Chris Wayne
As we usher in spring, it’s a great time for small businesses to do spring cleaning on their data and focus on cybersecurity best practices. They should ask: How clean is their data, and are they sufficiently protected against security threats? What are the resources they need to ensure constant
By Michael Webb
The 2022 edition of K12 Security Information Exchange’s State of K–12 Cybersecurity Year in Review report states that ransomware has surpassed other types of cyberattacks as the most common threat perpetrated against K–12 schools in the United States. These ransomware attacks are carried out by sophisticated cybercriminals who often work overseas in countries