Archive for 57828255

Why you should manage your IoT devices like employees

Why you should manage your IoT devices like employees

Facebook discovers data breach that allowed hackers to control up to 50 million user accounts

Facebook discovers data breach allowing hackers to control up to 50 million user accounts

At last, some common sense tips to monetize, plan, and implement your IoT deployment.

http://iiot-world.com/connected-industry/seven-lessons-industrial-iot-data-teams-remember-2018/

7 out of 10 organizations say their security risk increased significantly in 2017

https://blog.barkly.com/2018-cybersecurity-statistics

Cybersecurity continues to be a growing priority for organizations of all sizes, across all industries. See how the latest stats and trends are shaping plans, spending, and priorities for 2018.

Top Ten Cybersecurity Tips For Businesses in 2018

https://www.observeit.com/blog/cybersecurity-best-practices-2018

This article originally posted by Oberveit on January 12th, 2018 gives a fresh outlook on the current year cyber threat landscape.

Checklist for Security Best Practices

https://technet.microsoft.com/en-us/library/bb735870.aspx

This posting from MicroSoft is a little dated now, but includes some good strategy tips and best practices to secure infrastructure and communications, and to increase the likelihood of maintaining business continuity.

60% of Small Businesses Close Permanently Within 6 Months After a Cyber Attack

https://www.denverpost.com/2016/10/23/small-companies-cyber-attack-out-of-business

The inconvenient truth about cyber attacks is that the majority are actually launched against small to medium sized businesses. The attacks are becoming more numerous and more sophisticated, and the impact to small businesses can be catastrophic.

Here are the technologies that CFO’s are expecting their organizations will need in the next 2-3 years.

https://www.ibm.com/blogs/insights-on-business/gbs-strategy/finance-leaders-unlocking-potential-digital/

NEW MALWARE DISCOVERED THAT TARGETS CRYPTOMINING

http://www.securityweek.com/crypto-mining-attack-targets-web-servers-globally

THE MOST OVERLOOKED CYBERSECURITY DEFENSE TACTICS

https://www.darkreading.com/vulnerabilities—threats/doh!!!–the-10-most-overlooked-security-tasks/d/d-id/1330820