08 Apr

8 Cyber Security Questions to Ask Your Cloud Service Provider

If you have decided to migrate your business to the cloud, you have to thoroughly scrutinize the security protocols of your chosen provider. No matter how much of your digital presence is in the cloud, you have to ensure your service provider has the best security measures in place to protect its infrastructure from cyber threats. What makes cloud computing so convenient is extensive connectivity, but that is also what is making systems like this vulnerable to cyber attacks – making the security issue one of the most critical components of its overall operations. Assuming all other boxes have been checked for your cloud computing needs, here are the cyber security questions you need to ask your cloud provider before completing the vetting process.
read more

Share this
01 Apr

5 Trends Driving the IoT in 2019

Given the Internet of Things’ perch atop the hype cycle, IoT trend-spotting has become a full-time business, not just an end-of-the-year pastime. It seems every major – and minor – IoT player is busy laying out its vision of where the technology is going. Most of them harp on the same themes, of course, from massive growth to security vulnerabilities to skills shortages. In addition to the IoT blurring the lines between IT, which runs the customers’ systems and email, and OT, which runs the technology behind the production systems, here is what will drive the IoT in the next year.

read more

Share this
18 Feb

Internet of Things: The Quiet Threat from the Inside

Internet of Things is increasingly infiltrating our lives not only at work, but also in our homes with people continuing to buy and install all kinds of smart devices in their houses. Yes, it is handy to have a device open you the front door because it has somehow recognized that your hands are full, and more importantly – that it is in fact you coming up. However, as per usual, the less money, skill and preparation you invest in the devices and building your IoT network, the more problems you can expect down the line.
read more

Share this
04 Feb

7 Quick Questions to Ask Before Building an IoT Network (Infographic)

Building an in-house IoT network is a long and difficult process which can endanger the company if not done right. The thing that gets most companies to miss a step is considering the complexity of the network – the more complex it is, the more there is to worry about. And it is certainly a job on a massive scale for any company, small or big. That is why it is important to consider a variety of things before embarking on this journey. Take a look at our new infographic to see just some of the questions you need to ask yourself before starting to build an IoT network.

read more

Share this
21 Jan

Internet of Things: 4 Biggest Fails of 2018

The concept of the Internet of Things – and its main advantage – is at the same time the biggest potential security risk for all those who have accepted it and have joined the circus, so to speak. Yes, people like having all the information all the time on all of their devices – neatly segmented and contextualized to fit their needs and situation. And yes, most of them haven’t given a second thought to providing access to their personal data to all kinds of services and systems in order to have everything they could ever want at the tips of their fingers – from comprehensive weather reports and traffic warnings to their own houses recognizing them as owners and turning the lights on upon entering. It is an interesting world we live in, with technology constantly at our beck and call, but are we also slowly starting to realize just how much we are allowing it to rule our lives? One could argue that every time the tech misbehaves or someone else takes advantage of it – and by proxy, us – it has failed us on some level. In that sense, let’s see the 4 times it did just that in 2018.

read more

Share this
14 Jan

5 Security Risks That Were Overlooked in 2018

Cyber security risks have become a constant for big and small businesses, individuals and companies, the private and government sector alike. And let’s face it – the risks are high. The more you are involved in the scary world on online connecting and doing business, the more exposed you are to the threats that reside within the dark world that can sometimes be the World Wide Web. Moreover, we are often not even aware of the danger and how close we came to be a victim of all kinds of malware, let alone the damage malware can cause and how to defend from it. In that sense, we have prepared a short list of security risks that pack quite a punch, but were overlooked in 2018.

read more

Share this
24 Dec

6 Cyber Security Trends for 2019

The tech industry has had a big year in 2018 with several new technologies arising and claiming their spots on the stage – blockchain, Artificial Intelligence and neural networks. These technologies have infiltrated every sector, from public services to business creating new opportunities for innovation and disruption, but aren’t without risks. New technologies are always slightly ahead of the security designed to protect them. For example, blockchain has created thousands of new ideas and businesses, but it has come with a bevy of high-profile cyber attacks and vulnerabilities. Nevertheless, cyber security has continued its steady pace of innovation and new solutions emerge daily. Here are 6 trends you should adopt in 2019.

read more

Share this
17 Dec

Cyber Security: 6 Things That Will Happen in 2019

The cyber security landscape is wide and getting increasingly more complex with every year – even month. With big cyber attacks happening on a regular basis, it’s hard for businesses – big and small alike – to detect the attacks and keep their IT networks and data intact and unused against them and avoid devastating effects on the business.
read more

Share this
12 Dec

The 10 Steps of the Log Management Lifecycle (Infographic)

Implementing a log management system is a good way to keep your cyber security high-level, but it’s mostly done to analyze an attack after it’s happened. That is not when it’s best employed and just by looking at the 10 steps it consists of will you will know why.

read more

Share this
04 Dec

The Log Management Lyfecycle – In 10 Steps

Log management is usually – and with good reason – implemented in order to analyze network security events for detecting intrusions and forensic purposes. That is – to see what happened only AFTER a cyber attack has taken place. Granted, it is pretty hard to detect cyber attacks, but we’ve moved away from the traditional cyber security requirements onto auditing and compliance as the reason behind employing cybersecurity measures, together with slowly accepting the importance of logging systems and application management. The purpose of introducing logging into an IT network notwithstanding, the process itself has 10 distinct steps we have prepared here for you to get acquainted with in order to help you protect your company from cybersecurity predators. So, let’s get to it!

read more

Share this

© 2017 Awontis. All rights reserved.