Michelle is a freelance technology writer. She has created technical content for a range of brands and publications such as: IBM Security, GE Digital, HP Enterprise, TechTarget, & Business Insider.
6 Strategies to Attract, Engage, and Retain Gen Z Workforce
Gen Z is considered one of the largest generational cohorts to join the global workforce. This generation, roughly defined as those born between 1997 and 2012, is considered the first generation to grow up with mature technologies like smartphones and tablets. Social media content may have heavily influenced their approach to work and life over time.
What “Beginner” Skills do Security Leaders Need to Refresh?
The chief information security officer (CISO) was once a highly technical role primarily focused on security. But now, the role is evolving. Modern security leaders must work across divisions to secure technology and help meet business objectives. To stay relevant, the CISO must have a broad range of skills to maintain adequate security and collaborate with teams of varying technical expertise.
Is Patching the Holy Grail of Cybersecurity?
A proactive approach to cybersecurity includes ensuring all software is up-to-date across assets. This also includes applying patches to close up vulnerabilities. This practice minimizes risk, as it eliminates outdated software versions in the process. Does this make patching a catch-all cybersecurity solution?
The Role of Marketing and PR in Incident Response
Responding to a cyber incident requires teamwork across departments and disciplines. Technical incident responders must work to halt incoming attacks while the communications teams develop a public response. Clear communication is essential.
Communication strategies differ before and after a cyber incident.
The Role of Finance Departments in Cybersecurity
Consumers are becoming more aware of the data companies collect about them, and place high importance on data security and privacy. Though consumers aren’t aware of every data breach, they are justifiably concerned about what happens to the data companies collect.
The Role of Human Resources in Cybersecurity
The human resources (HR) department is an integral part of an organization. They work with all departments with a wider reach than even IT. As a highly visible department, HR can support and improve an organization’s security posture through employee training. Their access to employees at the start of employment is an opportunity to lay a foundation for a culture of risk awareness.
The 13 Costliest Cyberattacks of 2022: Looking Back
2022 has shaped up to be a pricey year for victims of cyberattacks.
Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack.
Emotional Blowback: Dealing With Post-Incident Stress
Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there’s the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing.
Amidst these growin...
Don’t Wait To Embrace CISA’s Vulnerability Management Rules
Vulnerability management is the time-consuming process of finding and patching a seemingly unlimited number of potential risks. The National Institute of Standards and Technology (NIST) reports more than 23,000 new vulnerabilities for 2022, where more than 17,000 are classified as critical. For many organizations, simply prioritizing vulnerabilities becomes a monumental task on its own. The resulting backlog makes an attractive target for threat actors who strike before fixes roll out.
Business continuity: Shifting from passive planning to active risk mitigation and ensuring resilience
This white paper discusses business continuity planning (BCP) ― a practice that guarantees continued business activities during a major disruption. In BCP, the first step is identifying assets, followed by formulating a clear plan to protect them. BCP also includes specific instructions, policies, and procedures for maintaining systems and operations
Securing home WiFi for older adults
Managing a home WiFi network can become a job on its own, especially when people aren't aware of today's cyber-security risks. This is often the case for older adults who are still mastering the use of digital devices. A recent study found that elderly people tend to be more trusting and less confident with technology, making them more vulnerable to malware and online fraud. They also often lack the basic technical knowledge required for things like connect...
What is wireless home automation?
What's it like to live in a fully automated home? Your lights switch on or off automatically depending on the time of day or number of occupants in a room. You can close your garage door remotely from an app on your smartphone and set your refrigerator to automatically order groceries when you're running low. You can even manage your home security system remotely when you’re not at home—and since these features are part of a larger network, you can control them all from one central location.
...
10 Signs You're Computer Illiterate
We all like to think we are pretty savvy when it comes to computer technology. Bookmark this article and share with the computer illiterate in your life as necessary!
Computing and the web are changing at a rapid pace. The vast expanse of the digital world can be tough to tackle when there’s so much material to know. Chances are good you might be computer illiterate if you’re not quite familiar with these 10 concepts. Consider this a shortcut to help you on your way!
1. Multifactor authentica...
The Best Practices for Managing Cloud Applications
Moving services to the cloud might mean adopting a new way of thinking, in terms of managing them.
Multi-cloud application management is a key feature of application management today. Moving applications to the cloud has long been a matter of "when", rather than "if" as more options have become available over time.
Back in 2018, a reported 86% of large enterprise technology decision-makers said they were using a multi-cloud strategy. Multi-cloud adoption continued to increase year over year u...
What Is Customer Identity Access Management (CIAM)?
Customer identity access management (CIAM) solutions enable companies to manage more than just customer information. CIAM makes it possible to manage data-sharing consent, self-service customer registration, account management, single sign-on and multi-factor authentication (MFA) across channels (mobile, web, apps, etc.). So, what exactly is it? And how does it work?
CIAM is a method of securely managing customer information and access across systems and business units. For the business, it c...