Growing Cybersecurity Talent Gap Makes Businesses More Vulnerable, Less Secure

cybersecurity hiring
  • February 22, 2017
  • Print This Post
There’s a direct correlation between the ongoing shortage of qualified cybersecurity talent and the frequency and severity of data breaches, according to research from the Information Systems Security Association (ISSA) and others. A survey of worldwide security professionals “connects the dots” between the well-publicized skills shortage and enterprises’ inability to

Preventative Care against Data Breaches for Healthcare SMBs

medical data breach
  • February 14, 2017
  • Print This Post
Overall, the number of known data breaches increased 40% in 2016 compared to 2015, according to an Identity Resource Center report. The healthcare sector alone suffered hundreds last year, making it the industry most at risk in our nation, per both the Ponemon Institute and Trend Micro. Some security consultants

5 Ways to Start 2017 Cyber Safe & Secure

cybersecurity
  • February 2, 2017
  • Print This Post
As large-scale hacking events – such as recent breaches of Yahoo!, voter, health and banking data – continue to dominate headlines, leaders of small- to mid-sized businesses (SMBs) would be wise to remember your firm could be targeted, too. Especially after the holiday season, when you or your employees may

The Best Cybersecurity Solution: “Be Better at Being Human”

  • January 5, 2017
  • Print This Post
“If you want to master the digital economy, be a better human,” Paul Roehrig, global managing director of the Center for the Future of Work, told ITBusinessEdge columnist Don Tennant during a recent interview. Roehrig’s organization just released a study examining how businesses and jobs must evolve in response to

5 CFO-Worthy Cybersecurity Strategies

  • December 20, 2016
  • Print This Post
Regular readers of our blog know we often open posts by exhorting leaders of small to mid-size businesses (SMBs) to think and act like “big-time CIOs.” We understand that functioning as the chief executive and chief IT officer is typical for SMB leaders. But those aren’t the only hats they

Think Your SMB’s Too Small to Be Hacked? We Call That Denial.

Internet login screen with silhouette of a hacker
  • November 3, 2016
  • Print This Post
Are you among the small to mid-size businesses (SMBs) deferring a cybersecurity implementation or update? Is it because you believe that data breaches only happen to others? Or that you’re too small to be the target of cybercrime? That’s what the bad guys are hoping you’ll think. According to National

PCI Primer Part Two: Security is Compliance Job #1 for SMBs

Torso Locking Mobile Devices Via A Cloud Network
  • October 20, 2016
  • Print This Post
Earlier this year, the PCI Security Standards Council – a global forum responsible for the development, management, education, and awareness of the PCI Data Security Standard (PCI-DSS) and other standards that increase payment data security – issued a news release about a grave situation confronting small to mid-size businesses (SMBs):

PCI Primer Part One: 3 Simple Compliance Strategies for SMB

Folders with the label Compliance and Regulations
  • October 18, 2016
  • Print This Post
For small to mid-size businesses (SMBs) compliance with dozens of federal, state and local regulations — from data security and privacy laws to human resources and employee safety requirements – can be a daunting proposition. Not only do company leaders need to know which rules apply to their organization, they

Don’t Let a Whaler Harpoon Your Company…or Career

phishing
  • September 28, 2016
  • Print This Post
Businesses beware: The con is on. Again. However, in the most recent phishing scheme to surface from hackerdom’s murky depths it’s not the rank-and-file that’s under attack. It’s those in the executive suite. You may know it as ‘whaling,’ the sophisticated, effective and fast growing variant of the social engineering

5 Occasions When Sensitive Data May Be Especially Vulnerable

Male hand moving the queen
  • September 8, 2016
  • Print This Post
Between regulators, hackers and careless employees, it’s almost impossible to number all your compliance and security risks, let alone proactively manage them to mitigate vulnerabilities. Posts like our “Take the Headaches Out of Regulatory Compliance” and “5 Ways to Secure Your Company without Breaking Your Budget” offer some prudent and
Need Help with your IT?

Find a Location
Near You.

Gain
weekly
insight

into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter

About

ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.