The internet is seeing the growth of large-scale email solutions such as Office 365 that bring cloud-based email solutions in an easy to manage and reliable package.
Great podcast on cyber insurance and what it does and does not cover.
If your firewall cannot scan HTTPS traffic, known as Deep Packet Inspection (DPI), you will not be able to detect the majority of the threats on web traffic.
Hardware and software vendors want to collect your device feedback and usage statistics. This is a major privacy concern. it is not anonymous by any means.
Every cyber security event shoudl be treated like an attack. Not following the trail of evidence will only increase the severity of an attack.
Insurance will not necessarily cover you in the event of a cyber breach. You need to understand what sets to perform to be covered.
Who is ultimately financially responsible when a brach or denial-of-service occurs?
There are an endless number of devices that are connected to the Internet. But, are they secure or do they blow a gaping hole into your network?
Ransomware has grown in large part because of how good our security already is. HTTPS traffic is becoming more and more common.
How Michael Scott from the Office can be related to the topic of Network Security.