Microsoft 365: Can Your Business Benefit?

CCI can help you maximize a hosted Suite of Microsoft Productivity solutions to help drive your business forward. Learn more.

 

Wednesday, September 18, 2019/Comments (0)/

Preventing Cryptomining, Ransomware, and Other Related Threats and Breaches

Information security threats today come in many forms. If your organization is not prepared to recognize, fend off, and address threats like cryptomining and ransomware, your company’s financial resources and information, as well as your clients’ and employees’ information, are at risk. As if that’s not bad enough, your company’s reputation is also on the line. According to McAfee Labs December 2018 Threat Report, cryptomining malware grew by an astonishing 4,000 percent from 2017 to 2018, from 500,000 new coin miner malware to 4 million, while total malware grew by 203 percent in that time.

Understanding emerging threats and implementing solutions designed to address those threats can help you be prepared to ward off attackers and protect your organization’s bottom line. Learn more.

Thursday, July 18, 2019/Comments (0)/
Tags:

Distributed Denial-of-Service (DDoS) Attacks - An Economic Perspective

The first Distributed-Denial-of-Service (DDoS) attack is attributed to the efforts of a 15-year-old Canadian teenager who was able to intermittently attack Yahoo, Amazon, eBay, E*TRADE, and other companies throughout February 2000. The attacks resulted in the cumulative costs of approximately $1.2 Billion. Fast-forward to 2019 and DDoS attacks are not only occurring more frequently, but they are also more complex and destructive. The attack landscape has drastically expanded from a curious 15-year-old with access to public hacking tools, to cyber-terrorists and professional hackers interested in destabilizing businesses for financial or political gain. Learn more.

Tuesday, July 9, 2019/Comments (0)/
Tags:

Port-Based Firewalls: Is Your Organization's Data Truly Protected?

Your company’s network security is arguably the most important part of your information security efforts. If you are still relying on a port-based firewall, however, your company’s, clients’ and employees’ information may be more at risk than you realize.

With an increase in mobile device and cloud applications, and a growing number of devices online in one form or another (the “internet of things,”) organizations face more threats than ever before from both internal and external sources. In fact, according to Cisco, the number of devices connected to the internet today is a staggering 15 billion. By 2030, the number is expected to reach 500 billion (source: Marketsandmarkets.) Learn more.

Monday, June 24, 2019/Comments (0)/
Tags:

Assessing and Understanding Your Organization's Security Posture

How susceptible is your business to security threats? The reality is that no matter what industry you are in and no matter how large or small your company is, you are at risk of data breaches and other cyber threats. Those incidents can cost your company in many ways. While risk mitigation efforts come with costs, those costs pale in comparison to the financial, regulatory, and reputational risks businesses face when their cyber security efforts fail.

So, how prepared is your organization? If you’re not prepared to answer that question, it’s time for a detailed assessment of your organization’s security posture. Learn more.

Monday, June 3, 2019/Comments (0)/
Tags:
12345678910 Last