What actually happens to your stolen data

A study revealed that around the world, hackers attack once every 39 seconds. In 2018 alone, hackers stole over half a billion personal records — a 126% jump from figures in 2017. That’s a huge amount of data! This begs the question: what do hackers do with all this information?

To answer this question, you need to determine first why hackers hack.

What makes a great CIO

Is your small- to medium-sized business (SMB) looking to hire a Chief Information Officer (CIO)? If so, do you know what to look out for? Before you even post your job opening, you should be familiar with the key aspects that make a great CIO. To make things less stressful for you, here are some of the top qualities you need to consider when looking for a CIO.

Fits in
Before anything else, you need to be sure that the person you’ll hire will be a perfect fit for your company's culture.

Why multifactor authentication is important for cybersecurity

Passwords play a critical role in preventing unauthorized account access. Unfortunately, the Google-Harris Poll 2019 password survey showed that many Americans have poor password practices. The survey’s highlights included:

24% of respondents use common passwords such as “abc123,” “Iloveyou,” and “Qwerty”

59% of respondents integrate easy-to-guess personal information (e.g., birthdays) in their passwords

22% of respondents use their own name as part of their password for at least one account

43% of respondents share their passwords with other people

66% of respondents used the same passwords across multiple accounts (e.g., online banking, email, and social media networks)

55% of respondents did not change their password after a breach

Given that the average American has about 200 accounts that require passwords, it’s no wonder people resort to using weak passwords that are easy to remember or reusing passwords for several accounts.

Improve employee morale with IT

Having high morale in the workplace is key to business success. When employees feel happy and appreciated, there is better productivity, improved work attendance and timeliness, less staff turnover, and increased customer loyalty.

To boost employee morale, some companies go so far as to leverage IT. Here’s why.

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.LEARN MORE HERE
+ +