Skip to content

Archived Cybersecurity Blogs

Strategies to Mitigate Work-From-Home Risk

The dispersed workplace creates new kinds of cyber threats, and many organizations face urgent cybersecurity challenges. The rise in remote and hybrid work environments brought about by the pandemic was estimated by Gartner to include 51 % of global workers at the end of this past year. And the prevalence of Work From Home (WFH) will almost certainly continue.

Jon Bolden

5 Biggest Cloud Cybersecurity Threats of 2021

Cybersecurity is already top of mind for every IT pro. And for good reasons. The Identity Theft Resource Center (ITRC) recently released its U.S. data breach findings for the third quarter. The good news is that publicly-reported data breaches decreased 9 percent in Q3 2021 compared to Q2 2021. The bad news is the total number of data breaches through the end of September 2021 already exceeds the total number of events for all of 2020 by 17 percent.

Jon Bolden

Why Cybersecurity Needs to Be at the Forefront of Application Development

IT departments are under constant pressure to build modern applications that improve customer experiences, automate workflows, and meet business objectives. Often, these applications are built on open-source platforms that contain costs and deliver proven functionality. But there’s one problem with open-source software. Cybercriminals can access the very same software development kit (SDK) that developers use. And because they know you’re building the application package with these open-source libraries, they’ll inherently see where the security flaws are—and be able to identify whether or not you’ve hardened the application.

Jon Bolden

Why Your Employees Need to Know About Secure Cyber Defense Practices

The statistics are alarming. By mid-year 2021, the vast majority of breaches—85 percent—involved a human element. And 91 percent of breaches start with a phishing attack. These social engineering schemes put your employees squarely in the crosshairs of hackers. And that’s why you need to reinforce secure cyber defense practices with your employees. A successful attack can be incredibly costly in terms of downtime and damage to your business’s reputation, ignoring for a moment the costs that follow if you can’t get your data back at all.

Jon Bolden

How AI and machine learning in cybersecurity bolster your defenses

Cybersecurity is front-page news, and its impacts are considerable. Consider that NBC News recently called ransomware “a major national security issue.” The same story says that the cybersecurity industry is stretched thin, with a shortage of workers to help stem the damage. The FBI 2020 Internet Crime Report shows how big the problem is, with the bureau’s Internet Crime Complaint Center receiving a record 791,790 complaints last year, with reported losses exceeding $4.1 billion. And today’s headlines make it clear that it’s only getting worse.

Jon Bolden

5 critical ways you can help prevent a DDoS attack (and recover faster)

While all cybersecurity threats are on the rise, one form of attack has a long history of wreaking havoc. The first-ever distributed denial of service (DDoS) attack in 1974 was the work of a 13-year-old student. In 1996, DDoS was first used as a commercial weapon when New York-based internet service provider Panix was targeted by a hacker using a spoofed IP address to overwhelm the company’s servers with fake “synchronize” packages. These early DDoS attacks function much like the modern versions, shutting down your network, servers, or sites by sending vast amounts of data that overwhelm targeted systems.

Jon Bolden

Contact Quest Today  ˄
close slider