Every cyber security event shoudl be treated like an attack. Not following the trail of evidence will only increase the severity of an attack.
Cyber Security and Data Backups are not unrelated. In fact, they are closely related.
Insurance will not necessarily cover you in the event of a cyber breach. You need to understand what sets to perform to be covered.
There is a rapid adoption taking place of multi-factor authentication. Are you looking at this?
Who is ultimately financially responsible when a brach or denial-of-service occurs?
IT Security and analyst book recommendations "Countdown to Zero Day", "Everybody Lies", and "Man, Interrupted".
Even though Social Hacking might seem like a new dangerous method of breaking into a network, it’s actually one of the oldest methods of manipulation.
There are an endless number of devices that are connected to the Internet. But, are they secure or do they blow a gaping hole into your network?
Ransomware has grown in large part because of how good our security already is. HTTPS traffic is becoming more and more common.
Phishing attacks aren't slowing down. The rate and the sophistication are increasing.
Schools have student and parent information, financial records, and medical records on file. They are a plethora of personal identifiable information.
So instead of an attacker targeting a company directly, some simple social engineering would let the attacker go after partner companies.
How Michael Scott from the Office can be related to the topic of Network Security.
There are reports that the American Dental Association has sent out USB drives laced with malware.
IT Personnel are in-charge when it comes to the security of their network. Policies need to be implemented by trained personnel.