security hygiene
Cybersecurity Hygiene—Building Blocks to Protect Your Attack Surface
Cybersecurity breaches or ransomware-induced shutdowns can crush a company. Financial loss. Reputation damage. Legal penalties. Nobody wants to be responsible for any of these, but attacks are on the rise. The average ...
Moving Beyond Security Culture Bottlenecks
Creating and maintaining an effective security culture is the holy grail for many, if not all, organizations in this era of security breaches and heightened privacy concerns among employees, customers and other ...
Security Hygiene, Posture Management Remain Challenging
Posture management is still one of the least mature areas in security, even though 86% of organizations believe they follow best practices for security hygiene and posture management. These were among the ...
Marketing, Aerospace, and IT Pros Struggle with Passwords
What do marketing, aerospace and IT professionals have in common? At first glance, not much. But a closer look will show you that there is something that ties them together—passwords. Namely, the ...
Successfully Influencing Employee Security Behavior
With phishing scams common and the risk of security breaches made more likely thanks to an expanding threat surface, security teams are debating how to deal with—and in some cases, punish—employees who ...
How To Tackle the 5 Biggest Enterprise IoT Security Challenges
The proliferation of IoT devices, particularly in the workplace, has left businesses with a new set of security challenges to deal with. For any company considering investing in IoT devices, it is ...
The OPSEC of Protesting
For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony McDade, and others. Many of the protesters ...
How Cyber Secure Is Your State?
Even the most cyber secure states didn’t score above a C average, which means there’s more work to be done Security and IT managers all over the globe have had to scramble ...
[Infographic] macOS Native Security Configurations and osquery
Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...
Real-Time Observations in Security Hygiene
The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and ...