Connected - Official Blog of Connection, Inc.
0 FOLLOWERS
Blog by Stephen Nardone. Stephen is Practice Director of Security and Mobility at Connection with over 34 years of experience in both the government side and the commercial side of the security business.
Connected - Official Blog of Connection, Inc.
4M ago
As the digital domain faces new and more threatening challenges, defenders are being driven to innovate and collaborate more closely than ever. Cybersecurity is a defining challenge of our time. Organizations of every size across every industry around the globe feel the urgency and pressure of protecting and defending against increasingly sophisticated attacks.
Watch Connection’s Cybersecurity Practice and Microsoft as they discuss the evolving cyber threat landscape, utilization of emergent technologies, and the importance of collaborative defense. Discussion topics will include cyber hygiene ..read more
Connected - Official Blog of Connection, Inc.
4M ago
A new Ponemon report showed the average total cost for the most expensive healthcare cyberattack experienced was $4.4 million, including $1.1 million in lost productivity. As healthcare executives look to protect their organizations from malicious attacks, right-fit solutions are the key to success.
Join Connection’s Healthcare Practice, Professional Services experts, and Barracuda as they discuss imminent threats, cybersecurity program strategies, and technology that will shed light on today’s challenges and the direction healthcare customers should be prepared to take.
Host: James ..read more
Connected - Official Blog of Connection, Inc.
8M ago
By 2026, organizations prioritizing their security investments via a continuous threat exposure management program will suffer two-thirds fewer breaches.* Zero Trust is all about keeping threat and risk in check. As threats emerge, they give rise to potential risks, and if unaddressed, these risks can culminate in breaches or compromises. This progression is essentially inevitable.
The transition from a traditional brick-and-mortar organization to a remote work or hybrid environment has introduced significant threats and risks that have now become our new normal. Unfortunately, gaps in busines ..read more
Connected - Official Blog of Connection, Inc.
1y ago
Organizations all over the globe are challenged with combating the massive increase in cyberattacks head on. Whether it be nation- or state-sponsored cybercrime or just your general nuisance hacker, the challenge is daunting. If you have services connected to the Internet, you are at high-risk of compromise. You most likely have heard, “It is not a matter of IF, and it is not even a matter of WHEN. You may have already been breached, and you just don’t know it yet.” In fact, 83% of organizations have had more than one data breach and 17% of the breaches that happened in 2021 were not first-tim ..read more
Connected - Official Blog of Connection, Inc.
1y ago
The recent shifts from in-person to online or hybrid environments has forced organizations to reexamine their cybersecurity practices and protocols. Keeping information and data safe has been more challenging as teams navigate vulnerabilities in our new digital world.
83% of organizations have had
more than one data breach.
Source: Ponemon Institute and IBM Security, 2022, Cost of a Data Breach Report.
Zero Trust and Zero Trust Architecture are concepts that have been around in the information technology and security industry for many years now. It is becoming more prevalent in conversations ..read more
Connected - Official Blog of Connection, Inc.
2y ago
I first became exposed to the concept of information warfare in 1989 when I worked for the government as a leader of a security evaluation program. We all learned that a devastating cyber attack to rival the impact of Pearl Harbor was a possibility. At this time in our cyber history, it was difficult for many people to truly understand what an “electronic Pearl Harbor” could mean. There had not yet been many significant security breaches, but we had experienced the Morris Worm, which took down what was then known as the Internet. So the premise was not that far-fetched—but not nearly as many p ..read more
Connected - Official Blog of Connection, Inc.
2y ago
Focusing on individual and security concepts outside of the workplace is a great way to build overall security awareness in general. The most important step is to learn how to recognize the danger—what are the threats to your personal information, and where are they most likely to come from?
I do a lot of public speaking on issues of security across the country, and one of my favorite questions to ask the audience is how many of them have received some kind of fraud alert from a credit card or bank. Just in the past year, the amount of people who raise their hand has gone up to about 50%, whic ..read more
Connected - Official Blog of Connection, Inc.
2y ago
Today’s workers demand flexibility and a seamless, consumer-grade experience with technology. Two-thirds now use a personally owned device for work, according to Gartner. An IDG Tech Pulse report predicts that the number of U.S. workers using a mobile device will increase to over 105 million in 2020, or over 72% of the total workforce.
Last year, 43% of employees said they spent at least some time working remotely, many using their own devices. Just 23% of workers are given company-issued smartphones, Gartner said. Thirty-six percent are provided with laptops.
It’s easy to understand the appea ..read more
Connected - Official Blog of Connection, Inc.
2y ago
We all know how important security in our digital age of information is. But are you up to date with the latest strategies for managing the security of your corporate data? We surveyed a group of your peers about how they’re handling data security in the age of anytime, anywhere access. Here are some highlights:
Non-U.S. data centers manage data for about 55% of organizations
Nearly 50% of organizations are considering DLP technology for 2017
An average of 37% of digital corporate data bears sensitivity labels
To get the full results of our survey, and to see how your organization matches up ..read more
Connected - Official Blog of Connection, Inc.
2y ago
Curious about what the coming year has in store for enterprise mobility? We recently partnered with industry-leading research firm IDG to see what the latest stats reveal. Do you know what the latest trends are in mobile app development? According to IDG, a third of organizations are developing mobile apps in house, but almost half are using a mix of in house and outsourcing. How does your organization compare?
It’s a Wireless World
Today, the world has gone mobile and your organization needs to be on-the-go accessible to stay competitive. From app development to optimization for mobile device ..read more