by iTrust | Apr 5, 2016 | Blog, Uncategorized
A new survey into cloud concerns undertaken by database security firm HexaTier provides no surprises: security risks (44%) followed by compliance and regulation (29%) are the two biggest factors preventing greater cloud adoption (although we are specifically talking...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
Cyber insurance rates have dropped, thanks to a drop in major data breaches. The relative quiet in massive breaches has prompted insurers to lower insurance prices during first three months of 2016 for high-risk industries including retail and healthcare, according to...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online....
by iTrust | Apr 5, 2016 | Blog, Uncategorized
You could be next. Take a look at these examples of how a security consultant was recently hired to infiltrate a company’s buildings and networks – mirroring a crook’s social engineering attempts to get at sensitive personal and corporate data. This was all done...
by iTrust | Mar 30, 2016 | Blog, Uncategorized
It all depends upon your level of risk and how badly you want the data returned to you unharmed. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...
by iTrust | Mar 30, 2016 | Blog, Uncategorized
To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene. We’re undergoing one of the biggest transformational changes in IT since the introduction of the...
by iTrust | Mar 30, 2016 | Blog, Uncategorized
As new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and...