The nonprofit group Open Privacy Research Society recently publicized that the confidential medical and personally identifiable information (PII) of patients across Vancouver, Canada, is being leaked through the paging systems of hospitals in the area. What do
A new family of malware with an apparent connection to the notorious Ryuk ransomware was uncovered — but instead of encrypting files, they were found targeting government-, military-, and finance-related files.
Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.
Here’s a closer look at the challenges enterprises are confronted with when adopting a more robust cybersecurity strategy, and how managed detection and response can help address them.
The GDPR is fast approaching and it is important to identify the weak links in your enterprise. Where can security be improved? Past experience has shown that third party suppliers are particularly susceptible to attacks.
An enterprise guide on network segmentation; how it works to secure large enterprise networks, why it's needed, and examples of some of the most widely used network models for different industries.
Tips and best practices for organizations and employees on protecting data and devices across multiple platforms, and what employees can do to avoid compromising the company's data and network.