Premium Government Content
-
Warning: What You Need To Know About Malware
7/14/2016
Most people think if they have a firewall and some kind of anti-virus program they are good, thumbs up, no need to worry about all that cyber stuff. Unfortunately, it is this kind of thinking that makes cyber criminals so wealthy and the rate of cybercrime go up. By David Nathans, director of security, SOCSoter
-
10 Ways To Create And Retain Engagement With Process Improvement
7/13/2016
Is your business struggling to get staff involved in process improvement initiatives? If so, you can take solace in knowing you’re not alone. By Ivan Seselj, CEO, Promapp
-
Applying Machine Learning To Identify Compromised Credentials
7/8/2016
It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. They know they need to not only discover all their own databases, but must figure out how to secure them once they do.
-
The Best Management Advice I Ever Received
7/7/2016
When I first started managing, I thought a lot about myself: how I was doing with my team, how I didn’t want to be a terrible manager, things I could do to become a great manager. Yet when I first started out, the advice I got was “it’s not about you anymore.”
-
Strategies Bosses Use To Avoid Apologizing
7/6/2016
Where in the world is the school where managers study apology avoidance. It always surprises me when perpetrator-like managers have already built an impressive array of personal apology avoidance habits and language. They don’t get this from their mothers, I know that. I also know those who ignore their mom’s advice deserve what they get.
-
Cyber-threats In 2016: Evolution, Potential, And Overcoming Them
6/29/2016
The contemporary business environment is essentially a small subsystem in the larger cyber world. Every enterprise, no matter how technically progressive or apprehensive about technology, is connected to and handles different streams of data. The current IT landscape is highly disruptive, but it does promise better business outcomes for those who are Internet of Things (IoT) ready and prepared to embrace Big Data. However, there are some apprehensions about this more connected, omnipresent, and easily accessible data — it opens many doors to hackers, creating room for Cyber threats to seep in.
-
Why The Time Is Right For The Global Telecom Industry To Engage MSPs
6/28/2016
According to Gartner’s 2016 CIO Agenda Survey, CIOs expect digital revenues to grow from 16 to 37 percent in the next five years, and public-sector CIOs predict a rise from 42 to 77 percent in digital processes. What this means is — with very few exceptions — businesses of all types are feeling the impact of consumer demand for digital services, and are looking to digital to extend the way their business interacts with its consumers.
-
Cyber-Security’s Weakest Link: People
6/27/2016
A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.
-
Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
6/24/2016
Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.
-
4 Ways To Deal With Cybersecurity Risks
6/21/2016
Web application security is a very hot topic these days. So what do CISOs need to know in order to deal with related risks?