By Dr. Christine Izuakor - July 27, 2020
Exploiting the Pandemic: Cyber Security Breaches in 2020
Exploiting the Viral Pandemic: Targeted Cyber Security Breaches in 2020 have ...
By Veriato - March 31, 2020
Cybersecurity Implications Of An Ongoing Pandemic
From a fully remote workforce, to cyber attackers, technology is playing a ...
By Dr. Christine Izuakor - January 08, 2020
Cyber Security Trends in the Energy Sector
Cybersecurity trends in the energy sector.
By Dr. Christine Izuakor - December 09, 2019
Five Reasons Why “Never” Being Breached May Not Be A Good sign
Countless companies have found themselves in the headlines after being breached ...
By Dr. Christine Izuakor - October 18, 2019
Cybersecurity Trends in Agriculture
The agriculture sector is a staple of critical global infrastructure. We need ...
By Dr. Christine Izuakor - October 14, 2019
Cybersecurity 101 For Entrepreneurs And Start-Ups
No matter how small in size or how new on the startup scene, these growing ...
By Dr. Christine Izuakor - October 07, 2019
Key tips to finish your 2019 cyber year strong and prepare for 2020
Forbes released its list of 2019 cybersecurity projections. Central themes ...
By Dr. Christine Izuakor - September 25, 2019
Disturbing Cybersecurity Trends In Aviation
Aviation is a critical infrastructure comprised of a web of public and private ...
By Dr. Christine Izuakor - August 13, 2019
Cybersecurity Trends In The Government Sector
Government agencies and their assets are subject to the same cyber threats that ...
By Dr. Christine Izuakor - July 30, 2019
Five Things You Should Know About Enterprise Visibility
Data breaches happen daily, many of which go undetected for months and even ...
By Dr. Christine Izuakor - July 08, 2019
Cyber Security Trends in the Tech Industry
The tech industry is one of the most swiftly evolving areas of business today.
By Dr. Christine Izuakor - May 06, 2019
Cyber Security Trends in Healthcare
A significant portion of breaches reported in the last year impacted the ...
By Dr. Christine Izuakor - April 16, 2019
What Is DLP. Why Does It Matter. What Is Your Strategy Missing?
Once upon a time, protecting critical data assets meant keeping printed ...
By Veriato - December 24, 2018
How to Maintain Data Security When Employees Work Remotely
How can you allow your employees to work remotely and still maintain security? ...
By Veriato - December 17, 2018
How to Conduct an Endpoint Network Security Audit
An endpoint security audit is an excellent way to ensure your network is ...
By Veriato - December 10, 2018
Cyber Security Budget Trends for Businesses in 2019
Here are a few cyber security trends to adopt in 2019 that will keep your ...
By Veriato - October 01, 2018
What you should do after a spear phishing attack
Spear phishing is very common and the likelihood it happens to someone in your ...
By Veriato - September 17, 2018
2 Big Steps to Keep Electronic Health Records Secure
The fear of stolen PHI and its consequences is so strong that many healthcare ...
By Veriato - July 02, 2018
Machine Learning Protects Employee Privacy & Data Security
Employee monitoring software leveraging machine learning prioritizes both ...
By Veriato - June 04, 2018
The CA Consumer Privacy Act | What Businesses Need to Know
Even if your business is not located in California, you may be liable under the ...
By Patrick Knight - May 21, 2018
Cyber Incident Reporting Compliance for Federal Contractors
Federal regulations require federal contractors to report a cyber incident ...
By Patrick Knight - May 14, 2018
Data Security Considerations for Your Work From Home Policy
Work from home policies have soared in popularity. Take these data security ...
By Veriato - May 07, 2018
The Severity of Cyber security Threats
Cyber security threats are being realized by vulnerable organizations large and ...
By Veriato - April 30, 2018
Best practices for securing your data when terminating an employee
Secure your data when terminating an employee. Make sure the employee is the ...
By Veriato - April 09, 2018
GDPR Mandates Immediate Data Breach Reporting
GDPR mandates that notification must be given when a breach is likely to ...
By Veriato - April 02, 2018
General Data Protection Regulation Compliance Objectives
The EU General Data Protection Regulation (GDPR) is the most significant ...
By Veriato - February 26, 2018
3 ways cyber security is changing business operations
As cyber security receives more consideration, business operations are changing ...
By Veriato - February 12, 2018
4 reasons to increase hospital cyber security budget
Health organizations are allocating less than half of what other industries ...
By Veriato - February 05, 2018
Technical safeguards for HIPAA at the administrative level.
Learn from experts how establishing HIPAA technical safeguards at the ...
By Veriato - January 29, 2018
Security concerns and solutions for staying HIPAA compliant
While HIPAA itself isn’t broken out into separate objectives for each ...
By Veriato - January 22, 2018
Expert advice on HIPAA data security
Learn from top security experts about the concerns facing HIPAA data security ...
By Patrick Knight - January 15, 2018
Defense Against Enemies, Foreign and Domestic
The inclusion of defense against domestic threats points to our Civil War and ...
By Veriato - January 01, 2018
U.S. Elevates Cyber Command to Combatant Status
Whether with national security or your enterprise security, cyber security ...
By Veriato - November 13, 2017
To cloud, or not to cloud. That is the question.
Thinking about storing sensitive information in the cloud? Be sure of the ...
By Veriato - August 20, 2017
5 employee cyber security training questions you need to ask
Chances are your organization already addresses cyber security training in new ...
By Veriato - February 27, 2017
A Not Exactly Up-Lyfting Incident
If you haven't seen the news about Lyft and its former COO, check out the ...
By Veriato - February 06, 2017
Are we counting on a Maginot Line?
A whole lot of time and money gets spent preventing acts or behaviors from ...