cyberattack Archives - Cannon Group
April 28, 2016

Are You Losing Money to Traffic Pumping?

Though security breaches seem to be most people’s greatest fear, traffic pumping is an underestimated and largely unknown culprit that could slowly but consistently be harming you financially.
March 16, 2016

How to Avoid Common and Costly BYOD Mistakes

To ensure maximized productivity and minimized risk with your BYOD program, it's essential to consider these factors: enterprise security, actual costs, the user experience, and a work-life balance.
May 20, 2015

Collaboration between CFOs and CIOs is Becoming Essential

CFOs and CIOs must work together to balance technology, investment strategy and risk. As CFOs become increasingly involved in IT, CIOs must help them make technology investment decisions using their knowledge of important IT issues.
May 12, 2015

More Hackers are Targeting Healthcare Providers

As cyberattacks become more rampant and hackers become savvier, the healthcare industry is finding itself in a dire situation. According to a recent study, cyberattacks against the U.S. healthcare system have more than doubled in the past five years—and it won’t stop there.
April 21, 2015

Fortify Your Security in 6 Steps

This week, the second largest U.S. health insurer became the victim of a massive cyberattack. In a world of instant sharing and storing information in the cloud, getting complacent with security is more dangerous than ever. Here are a few key pieces of advice to ensure that your information is secure as possible.
April 14, 2015

Here’s How Network Teams are Handling Enterprise Security

Security has been a hot topic in the business world lately. From cyberattacks to faulty enterprise security, there are many ways in which organizations can find themselves at risk. Experts say that network teams must take a more comprehensive approach to combat growing dangers.
February 6, 2015

Fortify Your Security in 6 Steps

This week, the second largest U.S. health insurer became the victim of a massive cyberattack. In a world of instant sharing and storing information in the cloud, getting complacent with security is more dangerous than ever. Here are a few key pieces of advice to ensure that your information is secure as possible.
January 23, 2015

The Worst Passwords of 2014

These are the most common, simplest and thus weakest passwords of 2014. They’re everything a password shouldn’t be: minimal, straightforward and painfully easy to guess... If you recognize any passwords on this list, it’s time for a password revolution.
January 8, 2015

7 Mobile Security Mistakes to Stop Making in 2015

One resolution to live by in the new year: With great technology comes great responsibility. The truth is that you could unknowingly be exposing sensitive information with a multitude of poor security habits. Read on and make sure to avoid these common mistakes in 2015.
December 31, 2014

What to Expect for Enterprise Infrastructure in 2015

The enterprise industry has seen immense change within the past several years, and as the new year looms ahead, experts say that 2015 will be no exception. Based on recent trends, expect increases in everything from cyberattacks to mobile investments in 2015...
December 16, 2014

Don’t Overlook Enterprise Security

While enterprise IT has made leaps and bounds in terms of technology and growth, the truth is that company IT environments could be more vulnerable than ever, thanks to a weak link in enterprise security.
August 27, 2014

New Cyberattack Targets 1,000 Major Networks – and Probably More

As mobility management becomes an important standard in the workplace, IT managers are becoming more willing to outsource mobility management to a third-party managed mobility services (MMS) provider. Here's why that could be a smart decision...
August 19, 2014

The State of Enterprise App Development

As mobility gains traction in the enterprise, mobile business applications are becoming more profitable for developers. However, recent research finds that only 16 percent of app developers participate in building enterprise mobile apps.
August 14, 2014

Security Advice from Cyber-Experts

Top “cyber-experts” talk about avoiding security threats in the digital world. While they point out that there’s no such thing as a catch-all solution, there are many ways to defend against cyberattacks.
June 17, 2014

Recent Cyberattack Calls Device Unlocking Policies into Question

At least 500 AT&T customers have become victims of a security breach, exposing sensitive personal information like Social Security numbers and birth dates. But the hackers' intent was reportedly benign: To unlock old, used devices.
April 28, 2014

Your Android Device May Be Vulnerable to Hackers

In the aftermath of Heartbleed, internet security is coming under close scrutiny. But it turns out that being hacked is still a very real threat for certain Android devices, calling enterprise mobile security into question.
April 21, 2014

Make BYOD Security a Priority, ASAP

As BYOD becomes an increasingly widespread trend in the workplace, a recent survey reveals that employees using personal devices in the workplace could be leaving themselves (and their companies) open to attack.
February 10, 2014

How to Ensure Mobile Security

While fast speeds and easy access to mobile Internet make LTE the next generation mobile technology, LTE devices are also more susceptible to security threats than their 3G counterparts. Defend your mobile device against increasing malware threats...
November 21, 2013

M2M: More Convenience Could Mean Less Privacy

The world of M2M is beginning to offer some neat (and convenient) innovations, but this convenience may come at a price. Without added security measures to keep this technology in check, our privacy (and possibly our safety) is very much at stake.