The Impact of Quantum Computing on Cybersecurity

In December 2020, Chinese researchers claimed to have developed the fastest quantum computer in the world. This computer, built using quantum particles and using light as a medium, can perform calculations exponentially faster than classical computers. What is currently the bleeding edge of computing and scientific research tends to become the norm at some point,… Read More

How to Choose a Security Partner: A Guide for Managed Service Providers

The reality of a world of always-connected customers and cloud platforms is that hackers are overwhelmingly targeting managed service providers. The main question posed in that article was how managed service providers could protect their clients with proper security measures. Here, we want to take this a step further to suggest that these managed service… Read More

7 Ways a Managed Service Provider Can Protect Their Clients 

Managed service providers carry a few additional burdens that many traditional IT companies don’t. Because the products and services of a managed service provider are used by different businesses, often in different industries, there is a balancing act between managing their own security needs and the needs of their clients. Different responsibilities, requirements, and approaches… Read More

How Managed Service Providers Can Support Clients by Focusing on Security

Thousands of companies, and an increasing number of government agencies, are relying on managed service providers for products like cloud storage, security administration, and productivity technologies. This has put tech experts in the profitable and challenging position of providing innovative products to support their clients. 

Managed Service Providers: What Security Solutions to Use and Offer

Cyber threats aren’t new, but hackers have increasingly turned their attacks on vulnerable managed service providers and their clients. With the data that managed service providers store for those clients, they are a treasure trove for attackers who would use that data to attack those clients, or the MSP itself, with malware and ransomware. 

The Evolving Cybersecurity Threats During the COVID-19 Pandemic

The U.S. Chamber of Commerce recently released a new report looking at the evolution of Cybersecurity threats during 2020, specifically during the COVID-19 pandemic. The pandemic has impacted businesses and individuals across every industry and geographic region. One of the significant areas affected is day-to-day work life. Remote work became the new normal for millions across the… Read More

Benefits of a Data Protection Impact Assessment (DPIA)

A Data Protection Impact Assessment (DPIA) is a process to help you identify and minimize the data protection risks of a project. The DPIA is an ongoing process, regularly applied to personal data processing, identifying, and mitigating risks. The DPIA is a part of the European Union (EU) General Data Protection Regulation (GDPR) compliance activities.

SOC 2 Reports Explained

What is a SOC 2 Report? Introduced in 2011, Service Organization Control (SOC) reports are becoming more and more popular in data security and compliance discussions with every passing year, especially SOC 2. But what is a SOC report? Which one do you need? Why is a SOC 2 report so important? There are three… Read More

Key Cyber Security Lessons from the 2020 Twitter Hack

On July 16, the social media platform Twitter experienced one if not the most significant, security breaches in its history when cybercriminals hacked into major public figures’ verified accounts and convinced users worldwide to transfer them nearly $120,000 in bitcoin. What can other organizations learn from this Twitter hack?

HIPAA Compliance and Telehealth

One of the many changes brought by the COVID-19 pandemic may be the permanent expansion of telehealth. According to a recent study, the US telehealth market is expected to witness an 80% year-over-year growth in 2020. Numerous video communications services exist, not all provide sufficient privacy and security to facilitate the provision of health care (and… Read More

Steps to ensure your Disaster Recovery Plan

There’s no telling when disasters will occur. The next disaster – a new epidemic, data breach, earthquake, or flood – could compromise data, result in lost business, or prevent employees from accessing a physical office. How quickly will your firm be ready to continue operations seamlessly? We have all experienced a change in the way… Read More

ISO 27000 Demystified

The ISO (International Organization for Standardization) and the IEC (International Electrotechnical Commission) provide a globally recognized framework for best-practice information security management: the ISO/IEC 27000 family of mutually supporting information security standards (also known as the ISO 27000 series). The most well-known of the series is ISO 27001, which sets out the specification for an… Read More

PCI Compliance is Vital to the Economic Engine of the World

The Evolving Need for PCI DSS Compliance. The current COVID-19 pandemic has dramatically accelerated a trend that was already on the rise — a move toward many new forms of electronic payment that involve capturing and transmitting credit card data. Businesses have moved online-only transactions during this crisis, and many consumers don’t want to handle… Read More

Something Phishy is happening – Phishing Scams on the Rise

Cybercriminals have been taking advantage of the coronavirus outbreak to target people with phishing scams and malware in the guise of information relevant to the disease. These attacks typically take the form of malicious apps, phishing emails, and phony websites. In addition, the US government has been offering stimulus payments, presenting another area ripe for… Read More

The Need for a Business Continuity Plan

The need for a business continuity plan is becoming more critical as businesses adjust to disruptions caused by the coronavirus. A virus in and of itself can’t shut your company’s systems, operations, or services down, but it can impact how a business functions. It’s not often that businesses face a pandemic. Still, natural disasters, human-made… Read More

Securing yourself in a Remote Work World

COVID-19 or the Coronavirus is changing life as we know it. From simple handshakes to finding toilet paper, life has changed tremendously over the past several weeks. One area that is significantly impacted is the rise of remote workers. Companies in every industry are mandating that employees work from their home offices. This sudden shift… Read More

The Coronavirus (COVID-19) meets Cyber Security

Real-world viruses and their online counterparts COVID-19 or the Coronavirus is changing life as we know it. From simple handshakes to finding toilet paper, life has changed tremendously over the past several weeks. Not only is this virus a physical threat, but it is also a threat to cybersecurity. Different scams, phishing emails, fake news,… Read More

Deploying Mobile Devices Securely For The SMB

Secure Mobile Device Deployments As we all know, mobile devices have become not only an integral part of the workplace, but also in society. Therefore, the safe deployment of these devices is of paramount importance not just for individuals, but businesses and corporations, government agencies, as well as other entities. For example: Mobile devices have… Read More

The Role of Artificial Intelligence in Cybersecurity

Artificial Intelligence in Cybersecurity Artificial Intelligence (AI) can be used in the Cybersecurity Industry in many ways, which are still yet to be tapped into. Just as much as other technologies are constantly and dynamically changing, so too is this field. It has just started to make its debut for security applications, and there is… Read More

SMB Cyber Security Threatened by Human Hacking

If you think your company is too small to be hacked, think again. According to a new report on SMB cybersecurity by the Ponemon Institute and Keeper Security, 66% of small and medium-sized businesses (SMBs) around the world experienced a cyberattack in the past year. In the U.S., the situation is particularly dire, with 76%… Read More

Preliminary Draft of NIST Privacy Framework Released

The NIST Privacy Framework will complement the popular NIST CSF Data privacy and cyber security have a symbiotic and sometimes conflicting relationship. Without robust cyber security, it is impossible to ensure data privacy, as evidenced by the Equifax hack. However, it’s fully possible for an organization to seriously violate users’ data privacy despite practicing robust… Read More

Dark Data Is Hurting Your Cyber Security

Server rooms filled with digital files may look neater than the paper file rooms of old, but they’re not necessarily more organized, and “dark data” lurks around every corner. Sixty percent of respondents to a survey by big data software vendor Splunk admitted that more than half of their organizations’ data is dark, and one-third… Read More