Each year, the Verizon DBIR provides insight into actual security incidents and the ever-evolving cybersecurity threat landscape. The 2019 report paints a picture of financial motivation, social engineering attacks, cloud vulnerabilities, and incident response failures.
Cryptomining malware attacks increase towards 50% of organizations hit globally Cryptomining attacks are the top cyber threat of 2018; they are costing companies hundreds of thousands of dollars, and will continue to grow as the malware used in the attacks spreads
SANS Suggests Less Than 50% of Cyberattacks Are Detected by Antivirus Software An analysis of cyber-attacks over the past year suggests that there is good news and bad news. The bad news is that the growing problem with antivirus software is that
IDC Global Research - 90% of Canadian Companies Breached Last Year IDC Canada Study reports high costs, rising frequency of security breaches for Canadian companies IDC Canada, the largest global research firm in Canada, conducts an annual independent cross-industry research survey of
The 5 Benefits of Moving to SD-WAN from MPLS SD-WAN Delivers Superior Performance and Scalability Over Traditional Architectures Businesses today rely on network connectivity more than ever. With increased adoption of cloud services for everything from email to payroll applications and even
Cyber-Fraud Scams that have Tricked Experts Even Cyber Security experts have fallen for ransomware scams, online dating scams, and get rich quick schemes Cyber-Fraud – Hackers bring old tricks to new targets Online scams are older than the Internet itself. The Nigerian
According to top research firm Gartner, enterprise security spending in 2017 reached an alarming $86.4 billion. This is forecasted to increase by at least $7 billion or nearly 10% in 2018. Indeed, information security has become a major investment for
Vulnerability Management Best Practices Vulnerability Management, especially the critical process of strategic patch management, have placed massive demands on organizations because of the high number of software vulnerabilities, the speed at which hackers take advantage of those vulnerabilities, and the complexity