Cybersecurity: A Nudge in the Right Direction

July 2, 2019

Knowing the right thing to do doesn’t always translate into doing the right thing. We all know there are speed limits, but we often break them. Traditional cybersecurity awareness programs usually present what to do, why to do it, examples of doing it and so forth, but people frequently still don’t do what they should be doing.

Spotlight

Nok Nok Labs

"Nok Nok Labs, Inc., based in Palo Alto, CA, was founded to transform online authentication for modern computing. The company is backed by a team of security industry veterans from PGP, Netscape, PayPal & Phoenix, and have a deep experience in building Internet scale security protocols and products. The company’s ambition is to fundamentally transform authentication by enabling end-to-end trust across the web using authentication methods that are natural to end-users and provide strong proof of identity. Our solutions will remediate and unify the authentication silos that exist today, and provide organizations with greater flexibility to utilize strong authentication solutions in adaptable ways."

Other Infographics
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

Alarming Cyber Security Stats to Know for 2022 & Beyond

Infographic | June 7, 2022

The best way to achieve security is to implement proper controls in place, train well on cyber-security, and follow the recommended best practices.

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More

Spotlight

Nok Nok Labs

"Nok Nok Labs, Inc., based in Palo Alto, CA, was founded to transform online authentication for modern computing. The company is backed by a team of security industry veterans from PGP, Netscape, PayPal & Phoenix, and have a deep experience in building Internet scale security protocols and products. The company’s ambition is to fundamentally transform authentication by enabling end-to-end trust across the web using authentication methods that are natural to end-users and provide strong proof of identity. Our solutions will remediate and unify the authentication silos that exist today, and provide organizations with greater flexibility to utilize strong authentication solutions in adaptable ways."

Events