Blog - Adaptus

The True Cost of Free WiFi Ease-of-access is a true double-edged sword. Like all powerful technologies, WiFi (public WiFi in particular) can be easily exploited. You may have read about attacks on publicly accessible WiFi networks, yet studies show that more than 70% of participants admit to accessing their personal email through public WiFi. WiFi vulnerabilities aren’t […]

Read More

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

Read More
data

For real change to take place, businesses and consumers alike need to understand the value of data.

Read More
2019 trends

The New Year has arrived and there’s no better way to start than by going through the past and learning from the experiences small and medium-sized businesses have had. Reports suggest that nearly 70 percent of SMBs have faced cyberattacks like phishing and web-based attacks.

Read More

An average of 5,000 to 7,000 new computer security threats are announced each year. Here's how to defend against them more effectively and efficiently.

Read More

Welcome to Part 3, of "3 Compelling Reasons to Invest in Cyber Security".  In Part 1, I discussed assessing and prioritizing your organization's risks as well as commencing a risk assessment.  Part 2 involved the importance of assessing your organization's supply chain and including such details within the overall risk assessment.

Read More

The push to move everything into the cloud over the past several years has generated a large number of misconfigured and exposed deployments of various software stacks. This has attracted sophisticated attacks that destroy data or abuse server resources for cryptocurrency mining.

Read More

Internet of Things devices–like smart lightbulbs or ovens or even toilets–are notoriously susceptible to being hacked. But the security problems go much deeper than preventing your average smart fridge from becoming a foot soldier in a botnet army.

Read More

In part 2, I will discuss your organization's supply chain.  Even if your organization's IT network is protected, your supplier may not be!  Why should you encourage the board to take this into consideration?  With today's delicate economy, the stability of the supply chain is also under threat.  An attacked supply chain can potentially be disastrous to profitability, business continuity, and compliance. 

Read More

This 4-part article is pivotal in helping you justify security investment to protect your organization in 2019.  I will suggest how you can make your case for the investment you need, as well as the key factors the board will be looking for in your case. 

Read More