<img src="http://www.shrfbdg004.com/63997.png" style="display:none;">

What’s the Difference Between a Data Leak and a Data Breach?

Posted on July 30, 2019 by Tim Femister

What’s the difference between a data leak and a data breach? I think this is both a great question and an important distinction to understand in today’s climate, where instances of both are regularly making national headlines.

Read More

Why Are We Making Information Security So Hard?

Posted on June 18, 2019 by Tim Femister

I often hear from folks that in general, small and medium-sized businesses lack a strategy and proper controls, but the big guys have it covered. Well, it might surprise you to learn that 30% of large enterprises state they still lack an overall information security strategy – and we’re talking huge, $25+ billion companies. Overall, 44% of enterprises report they lack a fundamental strategy. I’ll tell you from experience that most companies overestimate their cyber readiness, which means that the real numbers are likely much, much higher than the reported ones.

Read More

Why Is It So Hard to Protect Your Organization’s Information?

Posted on May 21, 2019 by Tim Femister

This blog is kicking off a series on a topic that many of you likely think about quite often: Why is it so hard to protect your organization’s information? This is a fair question, and one I’ve thought about often. To understand the answer, we’ll need to peel back a few layers and understand the root challenge.

Read More

Protect Your Organization by Modernizing Information Security Controls

Posted on April 30, 2019 by Tim Femister

Our national Cybersecurity Practice engages in thousands of customer conversations each year, and a few themes consistently emerge as primary concerns. The information security industry is plagued with confusion, complexity, and challenge, to the point that 30% of enterprises worth over $25 billion report that they do not have an overall information security strategy—and that number is substantially worse for the typical organization. Keep in mind that this simply refers to an information security strategy. It does not factor in the ability to implement that strategy, or whether the strategy is comprehensive or effective. Worse, most organizations overestimate their cyber preparedness, and factors like the global workforce shortage, security start-up sprawl, and cloud confusion are stymieing the effective implementation of information security strategies.

Read More

Cybersecurity 101: Your Path to a More Secure Enterprise

Posted on March 28, 2019 by Hal Overman + Joe Vigorito

In the first and second parts of this blog series, we shared the importance of focusing on the basics in cybersecurity and shared some tips for how to get started. Let’s wrap up by sharing some additional considerations you should address as you get started on your path to a more secure enterprise.

Read More

Providing a Secure and Efficient Customer Experience with Voice Biometrics

Posted on March 5, 2019 by Kathy Sobus

This blog was co-authored by Windsor Tanner, Vice President Solution Sales, Americas, NICE.

Read More

Cybersecurity 101: How Do You Approach the Basics?

Posted on February 19, 2019 by Hal Overman + Joe Vigorito

In the first part of this blog series, we shared the importance of taking a step back and ensuring that your cybersecurity program addresses the basics before moving forward with “shiny new objects” like advanced analytics and machine learning. In this part, we will share some tips to help you build that strong foundation for your cybersecurity program.

Read More

Cybersecurity 101: Have You Mastered the Basics?

Posted on January 29, 2019 by Hal Overman + Joe Vigorito

If you aren't doing the cybersecurity basics, then it’s time to take a step back.

Read More

Building Human Firewalls: 10 Steps to Cyber Awareness [Part 2]

Posted on November 1, 2018 by Tim Femister

Last week, I wrote about the first five steps to creating a culture capable of effectively defending against modern threats. This week, I'll take you through the next five steps. Let’s dive right in.

Read More

Building Human Firewalls: 10 Steps to Cyber Awareness [Part 1]

Posted on October 23, 2018 by Tim Femister

The best defense against modern cybersecurity threats is not based on technology at all. While there’s currently a great deal of focus on Artificial Intelligence (AI), good-ole human intelligence is the secret ingredient. To effectively prevent your organization from falling victim to cyber attacks, it’s essential that your employees develop strong cyber instincts. We constantly coach customers on the idea that the strongest firewall you can own is a resilient, human firewall. The statistics are staggering: spear phishing accounts for 95% of enterprise network attacks, according to the SANS Institute.

Read More