Blog
IT leaders see outsourcing cybersecurity as one solution to increased attacks
January 26, 2021
0 Comment
Veronica Combs
IT leaders are turning to outsourced cybersecurity support in response to the spike in cyberattacks since the start of the COVID-19 pandemic. Eighty-three percent of decision-makers with in-house cybersecurity teams are considering outsourcing to a managed service provider (MSP) within the next six months. That’s one of the top findings from a
The Dos and Don’ts for SMB Cybersecurity in 2021
January 26, 2021
0 Comment
Garrett OHara
It’s no secret that the COVID-19 pandemic has severely impacted small and medium-sized businesses (SMBs). While dealing with decreased foot traffic, greater local regulations, and growing expenses, cybersecurity has undoubtedly become a lesser priority for SMBs struggling to get back on their feet. In the midst of all this, cyberattacks
A CISO’s 2021 Cybersecurity Wishlist
January 26, 2021
0 Comment
Vinay Sridhara
Last year was particularly challenging for security professionals for several reasons. From the surge in cyber-attacks during the pandemic to the growing cybersecurity skills shortage, security professionals were spread thin and CISOs had to act strategically to maximize resources and protect their organizations. As we begin a new year, security
Maria Korolov
Ransomware, COVID-19, and nation-state attacks made 2020 a banner year for cybercrime. Many organizations were caught unprepared, even though there had been plenty of warnings about potential pandemics and nothing unexpected at all about more ransomware attacks or countries waging cyberwar. There are no signs this year will be better on
Making the Business Case for Cybersecurity
January 5, 2021
0 Comment
Zachary Comeau
There may not be a category of technology more important to a business than cybersecurity, especially as cyber actors become more skilled in their craft. In 2021 and beyond, securing your organization’s network and information should get as much attention as your core IT infrastructure and endpoint devices. There is