4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...
The Accidental Insider Threat – A clear and present risk

The Accidental Insider Threat – A clear and present risk

Media images depict the unknown ‘hooded’ bad actor in the dark room with many computer screens and we often forget about one the biggest risks organizations face – the insider. The insider can be broken into two categories, 1) the accidental insider who is duped...
Data theft by employee leads to federal indictment

Data theft by employee leads to federal indictment

Many businesses focus so much on protecting their data from outside threats that they give little thought to inside threats – namely their own staff.  For a manufacturer in Chicago, that turned out to be a very costly mistake! The company hired an engineer in...
What is proactive incident response?

What is proactive incident response?

Incident response as a term is reactive, so it’s no wonder that a proactive approach to incident response is a foreign concept to many clients and resellers that we work with.  Let’s look at a few common scenarios to understand why proactive incident...
Why you should frustrate your pen testers

Why you should frustrate your pen testers

The third or fourth step in any breach (depending on who you talk to) is that an attacker must ‘gain authority’. Think of it like a bank; if the criminal breaks into the vestibule they have little or nothing to steal, they have to get from the vestibule to the main...