Insight Blog

Security Gartner Blog FI

03 Nov: Pivoting Cybersecurity: Going on the Offensive

It has been about 5 years since WannaCry and NotPetya hit companies worldwide in full force, launching a new era of cybercrime. Now, there’s a new report of a ransomware attack weekly. Although this may seem scary, we know more now than we ever have. With each attack, we can see and ultimately learn from which vulnerabilities were exploited. We cannot prevent the inevitable, but we can prepare and minimize the effects. There is a famous quote by author Zig Zigler “Success occurs when opportunity meets preparation.” While a ransomware attack is not an opportunity to look forward to, it is important to be prepared. 

Modernize 2 Blog FI

29 Oct: 5 Tips to Avoid Toil & Trouble on Your IT Automation Journey

Accuracy in business processes has always been important, but it used to require tedious, error-prone manual processes to achieve. Today, accuracy and automation go hand-in-hand. For an easily recognizable example, just look at how modern retail stores manage their inventory. If stock runs low on certain items, the store will automatically kick off a stock replenishment process requesting that it be replaced.

Meraki MT-MV FI

26 Oct: It’s Time to Reevaluate Your Siloed Security Strategy

By converging physical and cyber security, organizations gain deeper business insights and better protection against sophisticated threats. The practice of segmenting security teams into distinct physical security and cybersecurity groups has been the norm since the early days of IT. Within the last decade, however, the Fourth Industrial Revolution, advances in cloud technologies and the digital transformation trend have led to a greater awareness between the cyber world and real world.

Cybersecurity Month CIS Blog FI

22 Oct: Unpacking the CIS 20 (Now the 18)

CIS Controls v8 is here, and there are some significant changes organizations should pay attention to. We spend a lot of time in our blogs talking about—and recommending—cybersecurity frameworks. The reason for this is pretty straightforward: there are a lot of decisions that go into cybersecurity planning, and failing to use a framework makes the process exponentially more complicated.

Cybersecurity Month Zero Trust Blog FI

21 Oct: 5 Mistakes Companies Make in their Zero-Trust Journey

Zero-trust is the logical successor to the legacy perimeter security model, but there are many common pitfalls to consider. Whether companies know it or not, we’re all on a journey toward zero-trust security. This concept, which can be summarized as “never trust; always verify,” has been around for over a decade as a security focus on least privilege. However, the pandemic brought it to the forefront, as corporate offices emptied and millions of workers started working from home. So, in a relatively short period, tens of thousands of companies inadvertently accelerated their zero-trust journey, often without a well-thought-out plan.

Rob Kim Redefine Work Blog FI

18 Oct: How Technology is Redefining Work

Just as the pandemic impacted technology investment and brought to light the need to do some “spring cleaning on technology debt”, the corresponding quarantine has changed the way we view work, including how we resource, build, and organize teams for collaboration. All organizations, including Presidio, were forced to quickly adopt and adapt to a remote workforce, with a greater emphasis on human-centric approaches to managing worker productivity quickly overshadowing the traditional office-centric design.

Pay Now or Pay Later FI

15 Oct: Cybersecurity Dilemma: Pay Now or Pay Later

The truth is that you’re going to pay for cybersecurity one way or another. So, it’s better to invest now while the cost is much lower and more predictable. As a business owner, you have lots of projects vying for your time and money, and let’s face it, anything that’s not a revenue driver is easy to push to the bottom of the list. Unfortunately, cybersecurity too often falls into this category. Companies may tell themselves, “We already have security in place. We have a firewall; we have antivirus software; our critical applications are password-protected.” The reality is that you’re probably well aware that cyberattacks have exploded in the past 18 months, both in terms of frequency and seriousness. This year, for example, the damage costs from cybercrime are expected to reach $6 trillion, up from $3 trillion in 2015. To put this number in perspective, if it were measured as a country, cybercrime would be the world’s third-largest economy after the U.S. and China. In the past, data breaches were about data loss and the potential harm to the victim’s reputation. Today, however, we see attacks that result in significant operational delays and setbacks.

Cybersecurity Month Endpoint Blog FI

13 Oct: Endpoint Security’s Evolution is a Big Deal. Here’s Why.

If the term endpoint security still evokes images of signature-based antivirus software, it’s time for a refresher on how critical this technology is to your organization. Time seemed to speed up over the past 18 months, with so many changes taking place in such a short period. For example, within the business world, digital transformation initiatives accelerated by seven years, according to a survey from McKinsey & Company. Besides the massive shift to remote work and new collaboration technologies, many companies had to update their security strategies.

Services Whitepeper Blog FI

11 Oct: New Whitepaper! A Definitive Guide to Conquering the Digital Era

In the blink of an eye, digital transformation leapt from to-do list item to daily lived reality for most companies. A global pandemic and its attendant business, social and personal consequences changed everyone’s plans, big and small. Ready or not, companies responded to a culture of social distancing by creating virtual workplaces on the fly. Suddenly the conceptual challenges of a digital business – access, resources, process, security considerations – have become extremely tangible. We collectively experienced a decade’s worth of technology adoption and business strategy executions in under two years. In the process, we have learned that digital business transformation is the ultimate challenge in change management because it impacts industry structures and strategic positioning—not to mention every task, activity and process within the organization.

Cisco Ransomware TALOS Blog

08 Oct: Ransomware Prevention: Best Practices to Follow and Pitfalls to Avoid

While there’s no silver bullet to preventing a ransomware incident, following security experts’ recommendations will greatly reduce your vulnerability. Thousands of Americans experienced the trickle-down effect of a ransomware breach in early May following the Colonial Pipeline attack, which shut down the oil supplier’s operations and left many scrambling to find gas and waiting in huge lines when they did. The attack originated from DarkSide, a Russian-linked criminal group, who threatened to leak the utility provider’s sensitive data unless the company paid a $4.4 million ransom.