• Sep 27
    2019
    Sadly, most small businesses do not make cybersecurity a top priority in the workplace. Company owners may think that just because they do not rival the giant corporations of today in terms of size of important, sensitive information means they are immune to hackers from any nation. This “it could never happen to me” mentality is what leaves many businesses vulnerable to cyberattacks. According to a recent study conducted by ...
  • Jan 16
    2019
    Recent research has estimated that damages caused by cybercrime could reach nearly $6 trillion by the year 2021. It sounds outrageous, but as cybercrime continues to advance in both sophistication and frequency, the number is absolutely achievable. As a response to the impending and expensive threats of the coming years, many companies are finally trying to build a culture of cybersecurity within their own teams to create an office-wide coordinated ...
  • Dec 12
    2018
    Regardless of how much your company spends on fancy automated cybersecurity systems, your employees are always going to be a weak link in your overall security plan unless they are properly trained and certified. Through cybersecurity awareness training, employees are educated on the dangers that lurk online and how they can properly identify them before the unthinkable happens. Are you unsure of the direct benefits of cybersecurity awareness training? Here ...
  • Nov 06
    2018
    The invention of artificial intelligence has undoubtedly been one of the most noteworthy technological advancements of the 21stcentury. As it has already infiltrated nearly every enterprise and industry of today, companies are using this technology to their advantage and amplifying their abilities – including the world of cybersecurity. Although it has definitely begun to make its mark on the industry as a whole, cybersecurity experts do not believe that artificial ...
  • Jun 06
    2018
    When the word “hacking” is mentioned in a conversation, people generally have the same image pop into their heads: a glasses-adorned hacker types furiously in front of several computer monitors while analyzing massive amounts of code to steal millions of dollars. He or she then mutters the fateful words of, “I’m in.” Thanks to movies and television shows, many think this is how cyberattacks occur. However, hacking is much less ...
  • Nov 22
    2016
    Almost every day, we see jaw-dropping illustrations of the growth of cloud computing. According to 451 Research (PDF), which does a quarterly survey of more than 1,200 IT professionals worldwide, 38% of respondents say their organizations have a cloud-first policy, meaning a cloud solution is prioritized over other types of development. The most common events that initiate expansions of cloud use are business events like mergers, acquisitions, and divestitures, as ...
  • Oct 11
    2016
    Two years ago this month, I increased the frequency with which I write in this space about cyber security. October is National Cyber Security Awareness Month, and Logical Operations is a dedicated supporter of cyber security awareness, so the subject seemed a good fit for this blog. It still is. Since then, I’ve written about cyber security at least a dozen times. But the security landscape has changed dramatically in ...
  • Sep 06
    2016
    Instinct is the propensity of a creature to engage in a defined behavior when presented with a certain stimulus. Sea turtles, for example, are born on the beach, but once hatched, they make their way immediately to the ocean. They are newborns, so it’s not something they have learned; it’s just something they do. It is a procedure, engineered by nature over countless generations of turtles, that results in the ...