Employees are Cyber Secure in Theory, But Not in Practice

February 4, 2019

Across the world, cybersecurity has moved from the shadows to center stage, due to increasing malware attacks and the soaring cost of resultant damages [predicted to rise to $6 trillion annually by 2021]. It’s no surprise therefore that Forbes predicts that cybersecurity is a top business priority in 2019 across organizations: “In 2019, cybersecurity concerns will be a major topic in the boardroom and executive offices of every significant enterprise.” Apart from technology that helps secure the organization from cybercrime, attention is being drawn to the crucial human element in keeping the organization safe. Verizon’s 2018 Data Breach Report puts human error as the cause of one in five breaches. According to Wombat Security’s State of the Phish, 83% of businesses reported being a victim of a phishing attack in 2018. An employee can be an organization’s weakest link or its strongest defense against cybercrime.

Spotlight

Awareness Technologies

Awareness Technologies secures companies against the widest-range of threats from inside the enterprise. It is the only provider of integrated desktop-based security, laptop protection and Data Loss Prevention (DLP) software. Our architecture operates invisibly at the desktop, instead of at the network level. This means two important things: first, our software is easier and less expensive to implement than competitors, with far lower total cost of ownership. Second, it affords a higher level of protection against a range of business risks from the theft or loss of valuable intellectual property and customer data, losses in employee productivity, theft of company laptops, employee misconduct, regulatory compliance.

Other Infographics
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Crowdstrike Incident Response

Infographic | June 13, 2022

A modern approach to rapid response and recovery from today’s widespread security incidents. Navigating the best path through the labyrinth of a widespread ransomware attack will determine the organizational impact and recovery cost to the business.

Read More
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

Cybersecurity Statistics for 2022

Infographic | June 10, 2022

If you work in the private sector (and provided you don’t live under a rock) you probably already know that cybercrime is a serious problem. A dastardly cybercriminal can expose finances, compromise customer information, and bring businesses to a halt. Skilled hackers are always finding creative ways to execute data breaches, setting a constant arms race into motion — cybersecurity professionals against cybercriminals.

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More

Spotlight

Awareness Technologies

Awareness Technologies secures companies against the widest-range of threats from inside the enterprise. It is the only provider of integrated desktop-based security, laptop protection and Data Loss Prevention (DLP) software. Our architecture operates invisibly at the desktop, instead of at the network level. This means two important things: first, our software is easier and less expensive to implement than competitors, with far lower total cost of ownership. Second, it affords a higher level of protection against a range of business risks from the theft or loss of valuable intellectual property and customer data, losses in employee productivity, theft of company laptops, employee misconduct, regulatory compliance.

Events