sms datacenter logo

Blog

new research for blackberry reveals organizations in all sectors lack tools and teams to address cybersecurity threats

New Research for BlackBerry Reveals Organizations in All Sectors Lack Tools and Teams to Address Cybersecurity Threats

Foundry’s report found that the most pressing challenges facing cybersecurity professionals are maintaining strong security and integrating modern technology, with managing XDR as an important missing link. BlackBerry published a survey of 405 senior IT, networking, and security decision-makers in the US, Canada, and the UK. According to the survey, 83% of organizations agreed that developing cybersecurity services is expensive due to the required tools, licenses, and personnel.

Read More »
how to secure saas applications

How to Secure SaaS Applications

Software-as-a-Service (SaaS) applications are becoming an increasingly common way to deliver software. The shift from traditional on-premises software delivery models benefits companies of all sizes. They can take advantage of a cost-effective and efficient way to access important business data. However, with this increased use of SaaS comes the need to ensure the security of these applications, plus the associated customer data stored within them.

Read More »
what is an external vulnerability scan

What is an External Vulnerability Scan?

Modern attackers are sophisticated and well-organized. They are continually finding new ways to attack businesses and organizations. Therefore, it is essential for companies to employ the latest tools and technologies to protect their systems and data. An external vulnerability scan is one valuable tool in this arsenal. In this blog, we will discuss what an external vulnerability scan is and its importance in safeguarding a company’s information.

Read More »
sec bumping up requirements for licensed security professionals

SEC Bumping Up Requirements for Licensed Security Professionals

The Securities and Exchange Commission (SEC) announced that it is going to be making changes to the requirements for professionals holding a license to work in the securities industry. The new measures focus on protecting investors and improving the overall operation of the securities market. SEC is currently accepting public comment on the proposed rule and will make a final decision later this year. What does this mean for you? Keep reading to find out.

Read More »
preparing for cyber insurance

Preparing for Cyber Insurance

Preparing for cyber insurance is an important part of any business’s risk management strategy. Cyber insurance is a type of insurance that help protect businesses from the financial losses resulting from a cyber-attack. It can cover expenses such as the cost of investigating the breach, restoring data, and providing credit monitoring services for customers. In addition, it can help cover the costs of lawsuits that may arise from the incident.

Read More »
medibank hacked customer information stolen

Medibank Hacked, Customer Information Stolen

Hackers breached Medibank, Australia’s largest private health insurer. The company confirmed that an unauthorized third party accessed customer information. The breach occurred earlier this week when an unknown attacker gained unauthorized access to a Medibank system containing customer data. Investigators believe the hacker took personal information such as names, addresses, and Medicare details from approximately 1.5 million current and former customers of Medibank and its subsidiaries.

Read More »
Understanding CIS Controls

Understanding CIS Controls

The CIS Controls are a set of best practices for securing systems and data against the most common attacks. Also known as the CIS Critical Security Controls or the Top 20, these controls can help organizations protect themselves from the most common and damaging cyber threats.

Read More »
Switching Phone Systems to Teams Phones

Switching Phone Systems to Teams Phones

Are you considering making the switch to Teams phones? If so, you are not alone. Many businesses are making the switch to take advantage of the features offered by Teams phones. In this blog post, we will discuss some of the benefits of making the switch and how you can make the transition as smooth as possible. Keep reading to learn more.

Read More »
security risks of using outdated technology

The Security Risks of Using Outdated Technology

Why do businesses use outdated technology? In many cases, businesses use outdated technology simply because it is what they have always used. They may not be aware of the security risks associated with using old software and hardware, or they may believe that their current system is good enough.

Read More »
Skip to content