Top Cloud Computing Security Risks for SMB

Small and medium-sized businesses (SMBs) are turning to the cloud for the mobility and affordability it provides. However, SMBs can fall victim to cloud security risks if they aren’t vigilant enough. According to Trend Micro, one of the biggest threats for SMBs when using the cloud is data breach which can be caused by either stolen or hacked devices. Data can be lost — or worse, leaked into the wrong hands — in this scenario. Fortunately, there is a way to combat this cloud security risk, and that’s to choose cloud service providers that offer remote wipe of data in case a device gets compromised.

Read More

The Three Tiers of Cyber Security

System infrastructure for cyber security is commonly divided into three tiers of infrastructure that breaks it down into separate silos presentation, applications processing and data management. This foundation of three modules that was developed by Open Environment Corporation (OEC), allows developers to exercise flexibility in reusing, replacing, adding or modifying software functions to client-server architecture.

Read More

Should You Use an App for That?

In the fast growing “internet of things” technology world we live in, apps are popping up left and right to help make life easier. There are apps for everything you could think of, restaurant searching, booking a taxi and even some meaningless for your entertainment. With the temptation right in front of you, claiming that it will completely solve your current issue whether it be boredom or hunger, you simply shouldn’t trust every app that is out there.

Read More

Does Your Company have a Cyber Security Policy?

Does your company have a Cyber Security Policy? If you have not already established a policy that protects both your company and its employees from possible threats, then now is the time to put it in place before you are taken unawares by a cyber attack or by unauthorized access or publication of proprietary and confidential information.

Read More

Wearable Technology: Are You Aware of the Vulnerabilities?

The Technology industry is advancing quicker than the consumers can keep up with it. Which is a great thing for the economy but not so much for the world of security. With all the new wearable gadgets that track things like number of steps and heartrate to your GPS location, there is no room for error when securing there devices from malicious eyes. The following are some popular devices and their associated vulnerabilities

Read More

The Cybersecurity Labor Gap; Not Enough Trained People is a Big Issue!

The world of technology is growing rapidly every day and so are the security vulnerabilities around these technologies. With so much of the business world reliant on technology, we need to ensure that there are enough trained professionals to properly manage and protect all the information made available through it. As it currently stands there are not enough IT security professionals that are properly trained to deal with such things as a cyber-attack, data leak and even an internal security audit. ISACA provided a survey in January that stated 86 percent of global organization leadership believes there are not enough skilled expects in the field to hire.[1]

Read More

Smartphone Security Awareness Key to Preventing Handheld Hacking

Smartphones are everywhere, and the number is growing by leaps and bound. More than a quarter of the total population in 2016 has a smartphone. The growth in popularity is often attributed to its functionality both as a cell phone as well as a computer. It’s not an exaggeration to call smartphones a handheld computer. All the functions of a computer can be performed on a smartphone these days.

Cyber security concerns for the smartphone users must be a primary issue since users store all their personal data personal data on their phones. You credit card number, the private pic that you took with your SO, and even you company’s sensitive data might be present on your phones. One intrusion from a hacker and your entire life can turn upside down. So, what’s the solution? Keep reading to find out:

Read More

Lack of Visibility = Lack of Protection

Visibility is everything as a security professional. You have to know what you are protecting before you can protect it. Going on a hunch and implementing security piece by piece as the issues arise is a sure way to find yourself in a bad situation. You could be working on something that you feel is high priority, without knowing that there are other pressing issues to handle. The following steps should be taken as soon as possible to ensure that you can cover the most ground as a security team.

Read More

Revolutionizing Enterprise Security with the Internet of Things

The Internet of Things (IoT) has been a major buzzword afloat in the field of business and technology. The internet has been the most phenomenal to have happened in these fields. It has helped the enterprises in connecting multiple devices to a platform and getting the desired results using syncing of such devices. Now, enterprises are trying to take it further. They wish to connect common household items to the internet! Such a step creates chills every time it is heard by the masses, but it stands true.

However, every technological innovation comes with its own downsides. The Internet of Things is sure to make things complex with everything connected to the internet. It is expected that about 20 billion things connected to the internet by 2020. It poses a serious question as to the security of these things connected online. If you’re an enterprise and worried about the security of the IoT, then you’re at the right place. This article will guide you in enhancing your security to deal with the upcoming threats. Let’s proceed:

Read More

Sandboxes; Beware of False Positives!

Sandboxing can be a valuable resource to any security team that puts the time and resources into it. If not, returning a bunch of false positives could just be a waste of your company’s resources. Below are some common steps that should be taken to ensure your sandbox is working properly for your company.

Identify all the applications in your business

Knowing your applications and what could be a possible vulnerability is great way to lure in the malicious threats. By implementing outdate code, programs and software that might coincide with your app, you are creating that easy attack vector hackers are looking for to infiltrate your systems. Really what you want to do here is set them up for failure. By not implementing security best practices on your sandbox applications, the attacker will feel like a kid in a candy store once they gain access to the sandbox.

Read More

Subscribe to Email Updates

About iSheriff

iSheriff is the leading provider of content and endpoint security from the cloud. We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide.