Cybersecurity: Seven Approaches For Improving Employee Buy-In

Cybersecurity is a must for modern businesses: Cybercrime accounted for more than $1.33 billion in monetary damages in 2016, according to a report on Statista. While companies are deploying numerous security measures, cybersecurity only works as well as the weakest link — meaning employees who may not be up-to-date, or onboard, with security routines have the potential to let […]

Security: a Top Consideration for Apps

Today, nearly every organization is looking to extend their offering though mobile applications in one form or another. From near exponential growth in mobile telehealth applications to innovative medical devices being accessible through mobile applications, we’re finding today that organizations are moving outside their typical model for providing value to their clients, and supplementing their […]

How AI Is Preventing Data Breaches In 3 Major Industries

Artificial intelligence (AI) and machine learning are allowing both businesses and consumers to boost their cybersecurity to unprecedented levels. In a recent post, we examined six ways that AI is leading the way towards rock-solid information security. In case you missed it, read it here. For this article, we’ll take a closer look at how […]

5 Easy Ways to Make Your IoT Security Rock-Solid

The Internet of Things (IoT) is amazing at making our day-to-day lives more efficient. Thanks to IoT development, we can now control our lights, thermostats, and even the locks on our doors with the push of a button on our mobile phones. We can even monitor our homes from afar with connected security cameras. But […]

The Current State of IoT Security: How We Got Here and What’s at Risk

What’s in store for the future of the Internet of Things (IoT)? Once reserved for industrial applications and smart security systems, IoT development has become ubiquitous today. For example, you can now walk into numerous retail outlets and purchase a toaster with Wi-Fi connection capability. But as IoT expands to include almost every type of […]

How to Streamline Your Internet of Things Data Management

The Internet of Things (IoT) is growing rapidly. Many organizations are racing to leverage the advantages this technology brings to their sectors. According to a study from Boston-based technology research firm IDC, IoT spend will reach almost $750 billion globally this year, which is an increase of 15% from 2018. Another report by IDC shows that […]

The Biggest Cybersecurity Risks to Healthcare Data Right Now

Between 2009 and 2017, 2181 healthcare breaches occurred. Each one compromised at least 500 records. Altogether, these security breaches exposed 176 million healthcare records—more than half the population of the United States. In 2017, the world suffered the greatest ransomware attack in history. The WannaCry ransomware, which targeted Microsoft Windows computers by encrypting data and […]

How IoT Cybersecurity Can Make or Break a Business

The Internet of Things (IoT) offers huge potential for both businesses and consumers. By 2020, Gartner predicts that 20.4 billion connected devices will be in use. While this figure and IoT’s exponential growth rate are impressive, it’s important to not lose sight of one of the technology’s biggest concerns: cybersecurity. Let’s examine how this issue […]

The British Airways Breach: 22 Lines of Code Stole the Data of 380,000 People

Whether you’re a mobile app developer or user, cybersecurity is serious business. Hackers are becoming more cunning and conniving with each day that passes. The data of approximately 380,000 British Airways customers could have been jeopardized recently. And it only took 22 lines of code to do it. Telltale Signs of a Common Culprit On September […]

Should You Be Concerned About Smart Home Data Security?

In most technologies, including the Internet of Things (IoT), developers worry about implementing functionality before cybersecurity. And while this plan of attack may work nicely for executives, it often leaves software vulnerable to an expensive security breach that costs more to fix than to build in from the get-go. According to Gemalto Security’s Breach Level […]