CCPA has changed how companies across America do business, and this California-based piece of legislation has had far-reaching consequences for consumer privacy and data protection. So what exactly is CPPA, and what are the implications of this groundbreaking and disruptive piece of legislation?
A modern cybersecurity strategy is a must-have for any organization, regardless of what industry you work in and how large, or small, your company is.
Microsoft has long been a trusted brand, consistently releasing products that vastly improve the technology sector. As certain industries and larger companies continue to seek ways to keep their data secure, Microsoft has in turn updated their product offering to assist with this growing concern.
We have all heard the statement loved by security folks, is not a question of “…if you will get attacked.” it is a question of “…when will you get attacked.”
Information Technology and the team behind it is more crucial to business than ever before. The old way of doing things has almost completely disappeared and everything is going digital. There are more apps, more mobile users, basically more of everything related to technology and data.
At the end of last year, I went to a Cyber Security event and the keynote speaker Charlie Miller, renowned hacker, talked about vulnerabilities in code. In his opinion, because we are human, we make mistakes and when we make mistakes in writing code (very common) vulnerabilities are created. It is stated that 96% of Web applications have code vulnerabilities (Cenzic). Charlie found one tiny vulnerability in his Jeep which allowed him to hack the vehicle and take control of the steering wheel.
Over the years, technology has allowed us to better collaborate with things such as on-prem phones, smart phones, email, Webex, Skype, and so much more. We use these these products every day and they help us to be more productive in a virtual world where employees and customers are dispersed hundreds to thousands of miles apart.
Your employees use a ton of applications whether they are web based, cloud based, or on premise. Making sure your users have access to these applications is integral to business productivity. On the other side of things, making sure you have visibility and policy on which applications can be accessed is extremely important to compliance and the overall security posture of your organization.