security hygiene

3 Tips for Organizations to Shore Up Their Cyber Resilience Strategies This Fall
As businesses gear up for another risky fall holiday season, visibility, control and security hygiene remain paramount for success and stability ...
Security Boulevard

Cybersecurity Hygiene—Building Blocks to Protect Your Attack Surface
Cybersecurity breaches or ransomware-induced shutdowns can crush a company. Financial loss. Reputation damage. Legal penalties. Nobody wants to be responsible for any of these, but attacks are on the rise. The average ...
Security Boulevard

Moving Beyond Security Culture Bottlenecks
Creating and maintaining an effective security culture is the holy grail for many, if not all, organizations in this era of security breaches and heightened privacy concerns among employees, customers and other ...
Security Boulevard

Security Hygiene, Posture Management Remain Challenging
Nathan Eddy | | CAASM, Cloud security posture management, digital asset management, security hygiene
Posture management is still one of the least mature areas in security, even though 86% of organizations believe they follow best practices for security hygiene and posture management. These were among the ...
Security Boulevard

Marketing, Aerospace, and IT Pros Struggle with Passwords
What do marketing, aerospace and IT professionals have in common? At first glance, not much. But a closer look will show you that there is something that ties them together—passwords. Namely, the ...
Security Boulevard

Successfully Influencing Employee Security Behavior
With phishing scams common and the risk of security breaches made more likely thanks to an expanding threat surface, security teams are debating how to deal with—and in some cases, punish—employees who ...
Security Boulevard

How To Tackle the 5 Biggest Enterprise IoT Security Challenges
Joseph Chukwube | | Data Privacy, Internet of things, IoT Security, security hygiene, shadow IT, unstructured data
The proliferation of IoT devices, particularly in the workplace, has left businesses with a new set of security challenges to deal with. For any company considering investing in IoT devices, it is ...
Security Boulevard
The OPSEC of Protesting
Ochaun Marshall | | attending a protest, cybersecurity protest, cybersecurity risks protesting, opsec, OPSEC security, Privacy, Privacy & Personal Security, protest Hong Kong, protest privacy, Protesting, security hygiene
For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony McDade, and others. Many of the protesters ...

How Cyber Secure Is Your State?
Even the most cyber secure states didn’t score above a C average, which means there’s more work to be done Security and IT managers all over the globe have had to scramble ...
Security Boulevard
[Infographic] macOS Native Security Configurations and osquery
Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...