A new version of PCI DSS is now available. With it comes major changes for service providers and merchants in how to protect cardholder data.
Are you a “service provider” as defined by PCI DSS? Do the changes affect you or your IT clients? Find out in this post.
Continue readingIs your company prepared to take on the network attacks targeting small businesses this year? Need to brush up on what threats to prepare for?
Read on to learn more about the top network attack trends that could be targeting your business in 2016.
Continue readingA ransomware plague has struck hospitals and other healthcare organizations across the U.S. Victims are paying ransoms of nearly $20,000 to unlock millions of files.
How does this happen? Why is healthcare a target? What can you do to protect yourself? Read on to find out.
Continue readingVerizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.
See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.
Continue readingWe are seeing more and more laws and regulations that outline the do’s and don’ts of cybersecurity. One in particular is the NIST 800-171 rule.
See how this particular new regulation can affect your cybersecurity business - big or small.
Continue readingRussian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.
See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.
Continue readingMobile phones are everywhere, and they hold a growing amount of our lives and work. But are they safe for the office? Is mobile malware a real threat?
See the top four myths about mobile malware and what they mean for your security. Find out how fast the problem is growing and how to keep your phone safe.
Continue readingThere is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.
See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.
Continue readingHealthcare networks took a beating last year. As they tighten security, attackers will look for new ways to steal health data – and lawyers may be the next target.
See research showing that many law firms who should comply with HIPAA don't. You will also see how you can use this trend to help protect your clients and win new ones.
Continue reading