Malware Manual – Part 5: 3 Keys for Cybersecurity Response Planning

password-people
  • September 21, 2017
  • Print This Post
Last month, the international research and advisory company Gartner, Inc., predicted global corporate spending on IT security will increase 7% this year over 2016 to roughly $86.4 billion. And looking forward, Gartner forecasts IT security will swell to $93 billion by the end of 2018. The driver of all this

Malware Manual – Part 4: Basic Tactics for Cybersecurity Monitoring & Maintenance

GettyImages_459434713
  • September 13, 2017
  • Print This Post
In the last installment of our Malware Manual series, we called today’s business security challenges a “cyber siege in the digital realm” because to many companies – large or small – the onslaught of cybercrime can feel like one. Why? Check out this sampling of recent headlines from around the

Malware Manual – Part 3: Your Best Fortification to Survive a Data Breach

  • August 10, 2017
  • Print This Post
Anyone who reads business books is familiar with military analogies for many aspects of running an organization – from strategic planning to operational efficiency. Leadership gurus encourage CEOs to read Sun Tzu’s The Art of War to learn strategy, as management consultants cite the work of famous generals for tactical

Malware Manual – Part 2: Building Your Cybersecurity Policy

Businesswoman holding digital tablet with showing umbrella icon on blackboard, insurance concept
  • August 8, 2017
  • Print This Post
Malware breaches are proliferating, per recent research shared by TechRepublic. The digital investigation firm Guidance Software surveyed more than 300 professionals in North America that hold IT security positions or perform tasks that fall within the IT security realm. Here are a few of the trends researchers discovered: More than

6 Must Have IT Security Policies to Safeguard Your Business

safeguard SMB
  • July 27, 2017
  • Print This Post
What better way to introduce the second installment in our IT Policy Primer series, IT Security Policies and Framework, than drawing from that wellspring of corporate wisdom, Dilbert. In an episode of the long-running satirical strip, Dilbert’s pointy-haired Boss ambles officiously into the bespectacled worker’s cube to announce the creation

IT Policies and Why They’re Essential to SMB Success

it policy
  • July 12, 2017
  • Print This Post
There’s no shortage of advice available to SMBs about using information technology (IT) to secure their company. We share plenty of it right here, in fact. But deploying the latest technology does little to protect a small business without enforceable, strategy-driven IT policies to clearly guide its use. Why IT

Malware Manual – Part 1: Recognizing Your Risk

malware security
  • July 6, 2017
  • Print This Post
Ransomware has been grabbing headlines in recent months, with attacks starting in countries such as the UK or Ukraine and then sweeping across the globe. High-profile industries, such as healthcare, have been targeted as victimized organizations vary from care providers to equipment suppliers. But instead of piquing the interest of

What Risky IT Management Methods Do Cyber Criminals Target?

it management mistakes
  • June 29, 2017
  • Print This Post
Part 3 in our Stalk the Stalkers Series A recent security survey revealed a shocking trend among small to mid-size businesses (SMBs): “SMBs aren’t taking security seriously enough at a time when they should be taking it more seriously than ever.” Here are the findings Kontzer’s latest slideshow discloses about

What Bad IT Habits Do Cyber Criminals Target?

  • June 27, 2017
  • Print This Post
Part 2 in our Stalk the Stalkers Series Last year marked the greatest spike of cybercrime in recorded history, per a study by IBM’s “X-Force Threat Intelligence Index 2017.” In 2016, 566% more data records were compromised compared to the year prior, IBM researchers discovered. In quantitative terms, more than

Why Do Cyber Criminals Want to Steal Personal Data from Your Business?

Hacker spy your data file
  • June 20, 2017
  • Print This Post
Part 1 in our Stalk the Stalkers Series In a recent interview, Dr. Chris Bronk, associate director of the Center for Information Security Research and Education at the University of Houston, told Wall Street Journal technology columnist Christopher Mims that, despite the billions of dollars spent on cybersecurity (analyst firm
Need Help with your IT?

Find a Location
Near You.

Gain
weekly
insight

into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter

About

ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.