What is the cybersecurity “poverty line” and how can you avoid it?

Businesses divided by the cybersecurity poverty line There exists an unfortunate reality in the cybersecurity sphere, in that it’s a matter of what you can afford and what you can’t. This fracturing line creates a harrowing reality, that there are enterprises with the capital to protect themselves and those left to struggle in the wind.

What is the cybersecurity “poverty line” and how can you avoid it? Read More »

Lawmakers discuss important steps needed for better healthcare cybersecurity

How the healthcare sector is changing with congressional attention The healthcare sector is no stranger to cyber-attacks. Even before the onset of the Coronavirus pandemic, it was battered and bruised by external threats, due in part to legacy infrastructure and outdated software. But, with COVID-19 and even harrowing geopolitical events, the foundation to launch threat

Lawmakers discuss important steps needed for better healthcare cybersecurity Read More »

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. The information they hold is more personal than even that which is in your wallet. It’s because of all your digital footprints.

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing? Read More »