User and Device Activity

People Continue to Remain Top Cyberthreat
People Continue to Remain Top Cyberthreat

Echoing the findings from the past year, and despite growing media frenzies over cyberattacks and malware, people continue to remain the top cyberthreat to businesses in North America. In North America, the most serious data breaches were attributed to careless / uninformed employee actions in 59% of cases and phishing / social engineering in 56% of cases. According to Business Perception of IT Security, a report from Kaspersky Lab as...

READ MORE
Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation
Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation

Security is not a black and white matter: there are vast shades of grey that exist in even the most well-thought out security architectures. APTs, zero-days, exploits, vulnerabilities, IoT threats, and the ever-present threat from an organization’s own users, all pose significant amounts of risk to your assets and the invaluable data stored on them. Not that many years ago, security was seemingly much easier – park a stateful...

READ MORE
Executive Endpoints Are Increasingly At Risk
Executive Endpoints Are Increasingly At Risk

The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.

READ MORE