Infographic: 2016 State of Application Security

January 28, 2016

The new research analyzed 126 popular mobile health and finance apps from the US, UK, Germany, and Japan. It also examined the perceived level of security app users and app executives believe to have in their applications.

Spotlight

revolv

Revolv delivers an all-in-one, affordable, simple, and elegant home monitoring and control system to the smartphone generation. The solution connects hundreds of wirelessly-enabled household items that are readily available from retailers such as Amazon, Home Depot, Lowe’s, and Best Buy, and intelligently integrates them regardless of different manufacturers or wireless protocols used. Homeowners now have the freedom to mix and match wireless devices in their home to achieve comfort, convenience, peace of mind and conservation right from their smartphones, home or away, with a single application experience.

Other Infographics
news image

CYBER SECURITY EXPOSURES INFOGRAPHIC

Infographic | January 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the case today. Small businesses generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More

Spotlight

revolv

Revolv delivers an all-in-one, affordable, simple, and elegant home monitoring and control system to the smartphone generation. The solution connects hundreds of wirelessly-enabled household items that are readily available from retailers such as Amazon, Home Depot, Lowe’s, and Best Buy, and intelligently integrates them regardless of different manufacturers or wireless protocols used. Homeowners now have the freedom to mix and match wireless devices in their home to achieve comfort, convenience, peace of mind and conservation right from their smartphones, home or away, with a single application experience.

Events