❰ Back to Blog

Lessons for 2017 : Top 3 IT Security Takeaways From 2016

Each year the cyberthreat landscape seems to get less favorable for businesses, and 2016 was no exception. Ransomware wreaked havoc on the healthcare sector. Meanwhile, phishing scams and malware intrusions cost banks tens of millions of dollars. Likewise, U.S. government agencies such as the IRS, and political entities like the DNC succumbed to fr...

Law and Disorder : Data Security Challenges in the Legal Sector

Talking about data security challenges, 2016 was a rough year, especially for the legal sector. There were several high-profile breaches, some of which will be talked about for years to come. Among the worst were the following:
  • Mossack Fonseca: 11.5 million documents known as the Panama Papers dating as far back as 1...

5 Things You Need to Know About Proteus Malware

Everyday, about one million new malware threats are released. Many of them will fall by the wayside without causing much damage. But some will leave a malicious mark in the memory of CIOs and CISOs everywhere. An example of such a cyberthreat is Proteus malware, a cousin to the well-known Andromeda botnet. Here's what you need to know about this mu...

Today’s Lesson : Classroom Computer Management 101

As desktops, laptops, tablets and smart boards continue to have an increasingly prominent presence in classrooms, the role of IT administrator is suddenly thrust upon educators at the primary and secondary school levels. In addition to worrying about malware intrusions that would disrupt courses and the possibility of students downloading games...

Smart Endpoint Management : 2 Proven Practices for IT Admins

For several years now, the rate of cyberthreat proliferation has significantly outstripped the supply of cybersecurity talent – a trend that shows signs of continuing at least into the next few years. According to Cisco, there were about 1 million cybersecurity job openings in 2015. By 2019, that number is expected to rise to 6 million, with ...