Financial services firms rely on BYOD – so how do they stay secure?

Bottom line: 2020 is going to be the year companies launch more digital business initiatives that depend on BYOD than ever before, making Zero Trust Security a key contributor to their success.

Financial services firms are at an inflection point going into 2020. Mobile-first products and services now dominate their product roadmaps for next year, with applications’ speed and security being paramount. In fintech, DevOps teams have been working with

By Louis Columbus, 15 November 2019, 0 comments. Categories: BYOD, Employees, Enterprise Mobility, Security.

Why improving endpoint security needs to be a primary enterprise goal in 2020

Bottom line: Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have cybersecurity goal for next year.

Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organisations’ endpoints with increasing frequency....

By Louis Columbus, 11 November 2019, 0 comments. Categories: Cloud , Data & Analytics, Data Loss, Employees, Enterprise Mobility, Security.

Five strategies healthcare providers are using to secure their networks

  • Healthcare records are bestsellers on the Dark Web, ranging in price from $250 to over $1,000 per record
  • The growing, profitable market for Protected Health Information (PHI) is attracting sophisticated cybercriminal syndicates, several of which are state-sponsored
  • Medical fraud is slower to detect and notify, unlike financial fraud (ex. stolen credit cards), contributing to its popularity with cybercriminals globally
  • Cybercriminals prefer PHI data because it’s easy to sell and contains information that is harder to cancel or secure once stolen. Examples include insurance policy...

By Louis Columbus, 08 November 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

It’s time to solve the education sector’s cybersecurity crisis

  • There were a record 160 publicly-disclosed security incidents in the education sector (K-12) during the summer months of 2019, exceeding the total number of incidents reported in all of 2018 by 30%
  • 47% of K-12 organisations are making cybersecurity their primary investment, yet 74% do not use encryption
  • 93% of K-12 organisations rely on native client/patch management tools that have a 56% failure rate, with 9% of client/patch management failures never recovered

These and many other fascinating insights are from 

By Louis Columbus, 18 October 2019, 0 comments. Categories: Applications, Data & Analytics, Employees, Security.

10 ways AI and machine learning are improving endpoint security

  • Gartner predicts $137.4 billion will be spent on information security and risk management in 2019, increasing to $175.5bn in 2023, reaching a CAGR of 9.1%. Cloud security, data security, and infrastructure protection are the fastest-growing areas of security spending through 2023.
  • 69% of enterprise executives believe artificial intelligence (AI) will be necessary to respond to cyberattacks with the majority of telecom companies (80%) saying they are counting on AI to help identify...

By Louis Columbus, 07 October 2019, 0 comments. Categories: Applications, App Platforms, Authentication, Security.

Why manufacturing supply chains need Zero Trust security

  • According to the 2019 Verizon Data Breach Investigation Report, manufacturing has been experiencing an increase in financially motivated breaches in the past couple of years, whereby most breaches involve Phishing and the use of stolen credentials.
  • 50% of manufacturers report experiencing a breach over the last 12 months, 11% of which were severe according to Sikich’s 5th Manufacturing and Distribution Survey, 2019.
  • Manufacturing’s most commonly data compromised includes credentials (49%),...

By Louis Columbus, 06 September 2019, 0 comments. Categories: Data & Analytics, Data Loss, Security.

The top 10 most popular cybersecurity certifications in 2019: A guide

  • IT decision-makers (ITDMs) report that cybersecurity is the hardest area to find qualified talent, followed by cloud computing skills
  • 56% of ITDMs report that certified personnel closes organisational skills gaps.
  • 48% of ITDMs report that certifications boost productivity
  • 44% of ITDM report that certifications help meet client requirements

Knowing which cybersecurity certifications are in the greatest demand is invaluable in planning a career in the field. I asked Global Knowledge, the...

By Louis Columbus, 05 September 2019, 0 comments. Categories: Employee Education, Employees, Security.

Mobile identity is the new security perimeter: How enterprises need to secure their mobile worlds

  • 86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets.
  • Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 of this year alone and over 5.3 million in 2018, 

By Louis Columbus, 03 September 2019, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

How AI is predicting the future of online fraud detection

Bottom line: Combining supervised and unsupervised machine learning as part of a broader artificial intelligence (AI) fraud detection strategy enables digital businesses to quickly and accurately detect automated and increasingly complex fraud attempts.

Recent research from the Association of Certified Fraud Examiners (ACFE)

By Louis Columbus, 22 August 2019, 0 comments. Categories: Applications, Authentication, Employees, Security.

A roadmap to Zero Trust for SMBs: Keeping security solid while moving swiftly

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches.

Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and network devices save thousands of dollars, hours of tedious work, and streamline operations. Good friends running an AI startup, whose remarkable...

By Louis Columbus, 27 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Why passwords are the weakest defence in a Zero Trust world

  • 90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG.
  • 86% of CIO, CISO and Security VPs would abandon password authentication if they could.
  • Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for replacing passwords.
  • There is a direct correlation between the number of times a user authenticates and the number of user access problems that need to be addressed.

These and many other fascinating insights...

By Louis Columbus, 24 July 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

How machine learning is helping to stop security breaches with threat analytics

Bottom line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up.

Separating security hacks fact from fiction

It’s time to demystify the scale and severity of breaches happening globally today. A commonly-held misconception...

By Louis Columbus, 27 June 2019, 0 comments. Categories: Applications, Data & Analytics, Enterprise Mobility, Security.

How the top PAM-mature enterprises are thwarting privileged credential breaches

  • Energy, technology and finance are the most mature industries when it comes to privileged access management (PAM) adoption and uses, outscoring peer industries by a wide margin
  • 58% of organisations do not use multi-factor authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged access abuse
  • 52% of organisations are using shared accounts for controlling privileged access, increasing the probability of privileged credential...

By Louis Columbus, 18 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

How machine learning is improving manufacturing product quality and supply chain visibility

Bottom Line: Manufacturers’ most valuable data is generated on shop floors daily, bringing with it the challenge of analysing it to find prescriptive insights fast – and an ideal problem for machine learning to solve.

Manufacturing is the most data-prolific industry there is, generating on average 1.9 petabytes of data every year according to the 

By Louis Columbus, 11 April 2019, 0 comments. Categories: Applications, Big Data, IoT.

Machine learning engineer is the best job in the US – according to Indeed

  • Machine learning engineer job openings grew 344% between 2015 to 2018, and have an average base salary of $146,085
  • At $158,303, computer vision engineers earn among the highest salaries in tech
  • The average base salary of the 25 best jobs in the U.S. according to Indeed is $104,825, and the median base salary is $99,007
  • Agile coach is the highest paying job with an average base salary of $161,377
  • 9 of the top 25 jobs in the U.S. this year are in tech fields according to Indeed
  • Five jobs are heavily dependent on applicants’...

By Louis Columbus, 02 April 2019, 0 comments. Categories: Applications, Employee Education, Employees.

10 ways AI and machine learning are revolutionising omnichannel

Disney, Oasis, REI, Starbucks, Virgin Atlantic, and others excel at delivering omnichannel experiences using AI and machine learning to fine-tune their selling and service strategies. 

AI and machine learning are enabling omnichannel strategies to scale by providing insights into the changing needs and preferences of customers, creating customer journeys that scale, delivering consistent experiences.

For any omnichannel strategy to succeed, each customer touchpoint needs to be orchestrated as part of an overarching customer...

By Louis Columbus, 12 March 2019, 0 comments. Categories: Applications, Employees, Marketing.

Why 74% of data breaches start with privileged credential abuse

Centrify’s survey shows organisations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials.

Enterprises who are prioritising privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In...

By Louis Columbus, 07 March 2019, 0 comments. Categories: Applications, Authentication, Security.

Why the missing link for enterprise digital transformation is Zero Trust Security

  • Enterprises will invest $2.4tn by 2020 in digital transformation technologies including cloud platforms, cognitive systems, IoT, mobile, robotics, and integration services according to the World Economic Forum
  • Digital transformation software and services revenue in the U.S. is predicted to reach $490bn in 2025, soaring from $190bn in 2019, attaining a Compound Annual Growth Rate (CAGR) of 14.49% according to 

By Louis Columbus, 19 February 2019, 0 comments. Categories: App Platforms, Data & Analytics, Security.

The top 10 ways IoT and blockchain will strengthen enterprise supply chains

  • The majority of enterprises are prioritising their blockchain pilots that concentrate on supply chains improvements (53%) and the Internet of Things (51%) according to Deloitte’s latest blockchain survey.
  • By 2023, blockchain will support the global movement and tracking of $2tn of goods and services annually based on a recent 

By Louis Columbus, 05 February 2019, 0 comments. Categories: Applications, Big Data, CIO, Enterprise Mobility, IoT.