COVID-19 has changed nearly every aspect of our lives, not to mention the operations of entire industries. Think about it: what does your ‘new normal’ look like? For higher ed institutions, it consists of the rapid switch to online learning to ensure the physical...
It Takes a Village: 5 Leadership Principles to Help Build a Resilient Cybersecurity Program
It takes a village. From day one, it requires hard work, attention, constant maintenance and nurturing. If you thought the ‘it’ we were referring to was a child, you’re on the right track, but sadly mistaken— we’re talking about a cybersecurity program. To keep up...
Post COVID-19: 4 Emerging New-Age Tech Security Challenges
If you’re like the majority of the world’s population, you’re probably cooped up in your home, wondering when life will return to normal. We hate to break it to you, but the new ‘normal’ won’t be so normal. The virtual workforce explosion has not only altered our...
The Future of Cybersecurity: COVID-19 Impacts
Cybersecurity was important pre-COVID-19, and it will be even more important post-COVID-19. As people around the globe are required to work from home, telework is becoming engrained into the fabric of billions of organizations, whether they like it or not. Does this...
5 Technical Recommendations for COVID-19 and Pandemic Preparation
We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters. Be aware of phishing emails Phishing emails and malicious activity increase during times of crisis. Attackers are opportunistic, so...
Emerging Security Threats: Defending Your Organization from Deepfake Technology
Following Facebook’s recent decision to ban deepfake technology from its social platform, many other social media companies are following suit, cracking down on what Mark Zuckerberg has called an “emerging threat.” Deepfake has quickly transcended from YouTube and...
2020 Cybersecurity Predictions
Imagine this: The year is 2020. You sit down for dinner and notice your children’s eyes are glued to the device in front of them. Your partner calls out from the kitchen, “Alexa, what time is my hair appointment tomorrow?” Suddenly, your Bluetooth-enabled crockpot...
Building a Security-Centric Culture in a Digital Age
Cyber is here, there and everywhere in between. As our technology-dependent world grows, consumers and organizations alike are eager to adopt the latest innovations. Digital transformation has many people focused on IoT, SD-WAN and the cloud while the topic of...