Articles tagged with: Cyberattacks

21% of SMBs Don’t Have a Data Backup or Disaster Recovery Solution in Place

21% of SMBs Don't Have a Data Backup or Disaster Recovery Solution in Place

New research (…) indicates that 58 percent of C-level executives at small and medium businesses (SMBs) said their biggest data storage challenge is security vulnerability. Nearly half (49 percent) of top leaders at SMBs said cyberattacks are their biggest data protection concern. Yet more than 20 percent of SMB leaders said they do not currently have a data backup or disaster recovery solution in place.

SMBs Don’t Have a Data Backup, Disaster Recovery Solution, data protection, cyberattacks

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.

How Companies Can Prepare for Cyberattacks, Data Breaches, cybersecurity, cyberattacks

3 Questions to Improve Cyber Incident Recovery

Cyber Incident Recovery

Cyber Incident Recovery, Cyberattacks, cybersecurity, information security, NIST cyber security framework
The NIST Cybersecurity Frame-work focuses twice on the concept of improvement, doing so within both the Respond and the Recover functions. For improved response, NIST recommends that organizations incorporate lessons learned into their response plans and update their response strategies. When it comes to improved recovery, NIST echoes that guidance: Companies should incorporate lessons learned into their recovery plans and update their recovery strategies. Because of these similarities, it is helpful to consider this article in the context of our May 2017 Cyber Tactics column, “Been Hacked? Let That Be a Lesson to You.”