The Major Challenges of Complying to the 20 CIS Controls in 2019

 

Coming out of 2018, we’ve learned a lot about the importance of proper cybersecurity structures and safety measures. The previous year has witnessed an increased number of cyberattacks and data breaches that left millions of people’s data compromised.

What to Expect from Hackers in 2019

The year of 2018 has been a wild ride when it comes to cybersecurity worldwide. The year before, in 2017, cyber-attacks cost small and medium-sized businesses an average of $2,235,000, as stated by Ponemon 2017 State of Cybersecurity in SMBs. We are still waiting for official statistics on how many cyberattacks took place during 2018. For all we know, there were too many data breaches and security incidents to count.

Why Your Business Needs Regular Security Assessment

 

Security assessments sound complex, which is why many business owners often neglect them. However, each business, no matter its size or the industry it belongs to, should have its security measures properly assessed in order to ensure all pieces of the puzzle fit together.

Understanding the NIST Framework

 

You may have heard of the NIST Cybersecurity Framework a few times online but, unless you have knowledge and experience in the world of cybersecurity, this topic can seem quite complex. However, once you take time to learn more about the framework, you will realize how simple and effective it can be.

The Risks of Not Meeting the Cybersecurity Standards for Small Businesses

It is safe to say that our technological abilities are advancing at a rate faster than ever. Naturally, with such a wide array of technological advances available at hand, we have become better at securing ourselves and our data on the internet.

Is your continuity plan doomed to fail?

Is your continuity plan doomed to fail?

Like all things, business continuity plans are not perfect. They have pitfalls that can result in your business’s failure if not taken into account immediately. Don’t blame it all on the IT guy; often, the way a system is designed can also have loopholes. Here are a few of the reasons why business continuity plans […]

Hide & Seek malware: What you need to know

Hide & Seek malware: What you need to know

What’s the worst thing that could happen to your Internet of Things (IoT) devices? If you guessed ‘getting infected with malware,’ you’re right. Many users think IoT gadgets don’t need the same protections required for PCs, laptops, and smartphones — but they do. There’s a new malware strain that attacks IoT-enabled devices, and you need […]

How business continuity plans can fail

How business continuity plans can fail

Your service provider, who you have tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Usually, that kind of longevity in developing continuity plans has resulted to some providers overlooking or underestimating certain issues. Here are some of them. Over-optimistic testing The initial testing attempt […]

Desktop Virtualization: Where is your desktop, really?

Wouldn’t it be nice if all the users who subscribe to a network are actually scattered far and wide geographically but they all have access to the same network and they are all connected to the same server or virtual machine through LAN or WAN or even the Internet? What if there could be a way to let each of these subscribers – no matter where they are – maintain their individualized desktops that house the applications and programs unique to each of these users while all of the computing prowess is contained not with the ‘client systems’ but with a central server?

It’s possible and it’s called Desktop Virtualization.

Why Business Must Go Green? – Part 1: It’s all About the Money

Data centres are ugly ogres when it comes to energy consumption. According to a report published by Rackable Systems[1], the year 2007 witnessed about 180 billion KWH on power requirements and cooling and a whopping $29 billion has been spent to feed this energy requirement alone.