Navigating the Cyber Landscape with Microsoft: Staying Ahead of Modern Cybersecurity Threats
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
4M ago
As the digital domain faces new and more threatening challenges, defenders are being driven to innovate and collaborate more closely than ever. Cybersecurity is a defining challenge of our time. Organizations of every size across every industry around the globe feel the urgency and pressure of protecting and defending against increasingly sophisticated attacks. Watch Connection’s Cybersecurity Practice and Microsoft as they discuss the evolving cyber threat landscape, utilization of emergent technologies, and the importance of collaborative defense. Discussion topics will include cyber hygiene ..read more
Visit website
Enhancing Patient Outcomes Through Secure, High-Performance Networks: Insights from Healthcare Experts
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
4M ago
A new Ponemon report showed the average total cost for the most expensive healthcare cyberattack experienced was $4.4 million, including $1.1 million in lost productivity. As healthcare executives look to protect their organizations from malicious attacks, right-fit solutions are the key to success. Join Connection’s Healthcare Practice, Professional Services experts, and Barracuda as they discuss imminent threats, cybersecurity program strategies, and technology that will shed light on today’s challenges and the direction healthcare customers should be prepared to take. Host: James ..read more
Visit website
Why Worry About Zero Trust?
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
8M ago
By 2026, organizations prioritizing their security investments via a continuous threat exposure management program will suffer two-thirds fewer breaches.* Zero Trust is all about keeping threat and risk in check. As threats emerge, they give rise to potential risks, and if unaddressed, these risks can culminate in breaches or compromises. This progression is essentially inevitable. The transition from a traditional brick-and-mortar organization to a remote work or hybrid environment has introduced significant threats and risks that have now become our new normal. Unfortunately, gaps in busines ..read more
Visit website
The Cybersecurity Roadmap to a Safer Future
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
1y ago
Organizations all over the globe are challenged with combating the massive increase in cyberattacks head on. Whether it be nation- or state-sponsored cybercrime or just your general nuisance hacker, the challenge is daunting. If you have services connected to the Internet, you are at high-risk of compromise. You most likely have heard, “It is not a matter of IF, and it is not even a matter of WHEN. You may have already been breached, and you just don’t know it yet.” In fact, 83% of organizations have had more than one data breach and 17% of the breaches that happened in 2021 were not first-tim ..read more
Visit website
Adopting a Zero Trust Cybersecurity Model
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
1y ago
The recent shifts from in-person to online or hybrid environments has forced organizations to reexamine their cybersecurity practices and protocols. Keeping information and data safe has been more challenging as teams navigate vulnerabilities in our new digital world. 83% of organizations have had more than one data breach. Source: Ponemon Institute and IBM Security, 2022, Cost of a Data Breach Report. Zero Trust and Zero Trust Architecture are concepts that have been around in the information technology and security industry for many years now. It is becoming more prevalent in conversations ..read more
Visit website
Information Warfare in 2021—Are You Protected from Cyber Attacks?
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
2y ago
I first became exposed to the concept of information warfare in 1989 when I worked for the government as a leader of a security evaluation program. We all learned that a devastating cyber attack to rival the impact of Pearl Harbor was a possibility. At this time in our cyber history, it was difficult for many people to truly understand what an “electronic Pearl Harbor” could mean. There had not yet been many significant security breaches, but we had experienced the Morris Worm, which took down what was then known as the Internet. So the premise was not that far-fetched—but not nearly as many p ..read more
Visit website
Simple Steps to Online Safety
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
2y ago
Focusing on individual and security concepts outside of the workplace is a great way to build overall security awareness in general. The most important step is to learn how to recognize the danger—what are the threats to your personal information, and where are they most likely to come from? I do a lot of public speaking on issues of security across the country, and one of my favorite questions to ask the audience is how many of them have received some kind of fraud alert from a credit card or bank. Just in the past year, the amount of people who raise their hand has gone up to about 50%, whic ..read more
Visit website
Challenges Multiply as Enterprise Mobility Grows
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
2y ago
Today’s workers demand flexibility and a seamless, consumer-grade experience with technology. Two-thirds now use a personally owned device for work, according to Gartner. An IDG Tech Pulse report predicts that the number of U.S. workers using a mobile device will increase to over 105 million in 2020, or over 72% of the total workforce. Last year, 43% of employees said they spent at least some time working remotely, many using their own devices. Just 23% of workers are given company-issued smartphones, Gartner said. Thirty-six percent are provided with laptops. It’s easy to understand the appea ..read more
Visit website
The Pulse of IT: Security
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
2y ago
We all know how important security in our digital age of information is. But are you up to date with the latest strategies for managing the security of your corporate data? We surveyed a group of your peers about how they’re handling data security in the age of anytime, anywhere access. Here are some highlights: Non-U.S. data centers manage data for about 55% of organizations Nearly 50% of organizations are considering DLP technology for 2017 An average of 37% of digital corporate data bears sensitivity labels To get the full results of our survey, and to see how your organization matches up ..read more
Visit website
Get the Latest Stats on Mobility
Connected - Official Blog of Connection, Inc.
by Stephen Nardone
2y ago
Curious about what the coming year has in store for enterprise mobility? We recently partnered with industry-leading research firm IDG to see what the latest stats reveal. Do you know what the latest trends are in mobile app development? According to IDG, a third of organizations are developing mobile apps in house, but almost half are using a mix of in house and outsourcing. How does your organization compare? It’s a Wireless World Today, the world has gone mobile and your organization needs to be on-the-go accessible to stay competitive. From app development to optimization for mobile device ..read more
Visit website

Follow Connected - Official Blog of Connection, Inc. on FeedSpot

Continue with Google
Continue with Apple
OR