Tagged - cybersecurity

Prepare for Five SMB Tech Trends in 2017

Develop an IT strategy with industry trends in mind. Use this research to evaluate if the business is ready to adopt emerging technologies in 2017. Leverage Info-Tech’s...

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

Schools Are No Stranger to Cyberattacks: What You Need to Know

The primary and secondary school sector has seen an increase in targeted cyberattacks driven primarily by the lack of consistent and robust security programs implemented...

Nonprofits: Know Your Limit, Build Your Security Program Within It

Nonprofits typically focus on their clients and services first – not a bad thing! However, to continue moving forward with their mission and vision, nonprofits need to...

Third-Party Security – It’s No Party

Healthcare organizations face a unique information security challenge: the requirement for data to be highly available and highly secure. Leveraging third-party service...

Cyber Insurance for Healthcare – Ensuring Your Parachute Is Packed Properly

Cybersecurity is a complex and rapidly evolving industry for which insurance providers often have poor powers of prediction. The following considerations and...

Why Board Members Should Care About (Cyber) Security

Telecoms are an attractive target to attackers – whether they know it or not. Board members can be a critical ally to the organization in getting cybersecurity strategies...

Reduce the Likelihood and Impact of a Breach in the Chemical Sector by Focusing on the End Users

While all industries are at risk of being targeted by threat actors of any kind, the chemical sector is at an increased risk due to the sensitive information they store...

Identity and Access Management for Connected Cars: Finding the Balance Between Security and User Experience

Technologies like IoT have risen in popularity greatly over the last few years. The automotive industry is now faced with the opportunity to incorporate these...

EFAIL: Why You SHOULDN'T Remove PGP and SHOULD Manage Your Threat Models

This PowerPoint deck summarizes the recently publicized OpenPGP and S/MIME vulnerability known as EFAIL and recommends actions that users can take to boost security.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us