Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report

Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report

Our Latest Research Reveals Opportunities and Threats As Business-Critical Data Moves to the Cloud By Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks Cloud services are now an integral part of corporate life. Companies use, on average, 1,154 cloud services ranging from enterprise-ready services procured by the IT department such as Office 365 to far lesser [...]

Five Tips for Not Becoming an Insider Threat

Five Tips for Not Becoming an Insider Threat

Most employees are honest, trustworthy people that would not steal from their employer or intentionally take sensitive, private information from their job and sell it. But many well-meaning employees are taken advantage of by attackers to steal data, and it can cost their employer (and customers) millions. Unintentional insider threats can cost a U.S. company [...]

Consumer IoT Security Impacts

Consumer IoT Security Impacts

Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. News of exploits against consumer IoT devices is common, and [...]

The Definition of Cloud Computing

The Definition of Cloud Computing

What is the cloud and why should I go there? The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-based solutions. Migrating to the cloud can be a scary prospect for many organizations. In fact, the question is often asked: What actually [...]

Three Ways to Improve Your Personal Cyber Safety

Three Ways to Improve Your Personal Cyber Safety

For National Cyber Security Awareness month there a couple of relatively easy-to-do things that I highly recommend if you want to improve your personal cyber safety. These important protections are easily available but not well documented. One of the biggest cyber security problems impacting users today is the reuse of easy to guess passwords across [...]