Category: Uncategorized
-
How to Outsmart a Hacker
Every time new IT security solutions are devised, hackers find new ways to break into systems. Traditional cryptographic and protocol approaches to security are no longer providing companies with sufficient protection. This is evident in the frequency of recent data breaches. It is also clear that consumers are routinely given a lot of outdated and inadequate advice.
(more…) -
Why Aren’t Corporations Focusing More on Cybersecurity?
With all of the recent news around cybersecurity vulnerabilities at large corporations, it’s surprising that companies aren’t putting more focus on preventing these incidents. Recently, many corporations — including Target, Home Depot and Sony — have suffered significant data breaches. Experts say that the frequency of these attacks is likely to increase because the technology to prevent a breach costs more than the breach itself. This may be true in monetary terms, but the damage to customer relations could be immeasurable.
(more…) -
Why Two-Factor Authentication is Important for Your Firm
Passwords were never enough for strong security, even in a non-digital era. Ali Baba overheard “Open sesame!” and was able to steal a cave’s worth of treasure. The Heartbleed bug announced last year put even encrypted passwords at risk. This year, Anthem reported a security breach caused by stolen passwords. Protecting your intellectual property and your customers’ personal information has never been more challenging or more important than in today’s information security environment, where risks abound and companies must maintain constant vigilance.

-
5 Identity and Access Metrics for Effective Risk Management
Your network security and risk management strategies have to account for a complex and constantly changing IT environment. Understanding the key identity and access metrics helps you incorporate effective identity access management throughout your organization. These metrics provide valuable insight into the devices connecting to the network, the amount of inactive user accounts, which users have high-level privileges, the frequency of password changes, and whether there are issues with account access.

-
Is There a Generation Gap in Cybersecurity?
According to a recent survey by Raytheon and the NCSA, young people ages 18 to 26 aren’t pursuing careers in cybersecurity. Young women – who make up just 10 percent of the industry’s workforce – are even less interested in cybersecurity than their male counterparts, with 52 percent of millennial women saying cybersecurity programs aren’t available to them in school. Only half of millennial men and one-third of millennial women understand what cybersecurity jobs even entail.

Why Aren’t Millennials Drawn to the Industry?
The results of the survey suggest young people simply aren’t getting proper information about cybersecurity in college. Meanwhile, a lack of entry-level cybersecurity jobs limits opportunities for recent graduates. It’s difficult for a new grad to find a job as a network security specialist when they don’t have industry experience, but it’s also challenging to earn that experience when entry-level opportunities are so limited. It’s a catch-22.


