Cybersecurity

As a CIO, I always struggled with the value of cyber insurance. The question of cost versus value kept me at a stalemate. On one hand, I was told that having this insurance was a must in case of a data breach, but on the other hand, it would be nearly impossible to prove what was needed to ensure a payout if a data breach occurred. In the midst of this conundrum, there was one guarantee I had to ensure – do everything in my power to protect the organization’s data and ensure continued operations no [ … ]
The MIDMRKT CIO Forum brings together top IT executives and solution providers in the midmarket space. After three days of collaboration, presentations, and networking, CIOs award the solutions providers that they see as strategic partners for their business during the “Vendor Excellence” ceremony. One standout vendor from the last two CIO Forums was @Risk Technologies. Winning multiple awards at the 2018 and 2019 CIO Forum, including the CIO Choice award, @Risk Technologies has proven to be a trusted and promising partner for the MIDMRKT CIO community. I sat down with CEO, Sean O’Brien to understand [ … ]
In a MIDMRKT Suite Survey of 212 IT executives in the midmarket, 76% of organizations allow for individually liable devices. In fact, of those 162 organizations, there are nearly 90,000 devices being used by employees for personal AND business use. How many of those devices have the “WhatsApp” downloaded today? Read Article Let’s review some daunting facts: Three years ago, Facebook exposed the world to Russian trolls filtering fake news stories to billions of people. Read Article. This displayed a vulnerability that the general population more or less accepted. Last year, they were found [ … ]
Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and malware, security professionals must look for hints of intrusion within the sea of data. Below are four key preventative actions organizations can take to mitigate the impact or avoid a surprise attack on the network: Establish Ground Truth: Understand [ … ]