Skip to Main Content

Dernières informations

94 Résultats trouvés

Ressources

Calian Cyber Security Breach Report - Issue 15 Data Breaches in Online Education

In today's digital business environment, enhanced and holistic cyber security is essential. However, many companies continue to struggle with resilience, often experiencing breaches that lead to everything from compliance issues, to lost and stolen data and, ultimately, to brand damage and revenue loss. And though it is easy to read about these breaches, the causes and potential solutions are rarely identified.

En savoir plus

Ressources

Calian Cyber Security eBook - The worst passwords of 2020

How to Avoid Becoming the Next Cyber Crime Victim

En savoir plus

Blog | novembre 26, 2020

This is all about your employee’s stolen identity

Everything in the modern age is digital—and of course you all know that. However, most people rarely contemplate what data is circulating around out there in the ether. Take one step further down the rabbit hole and apply that to personal data and, again, many still don’t internalize the importance or magnitude of what they create, share, and what is ultimately stolen for nefarious purposes.

En savoir plus

Blog | novembre 24, 2020

Virtual, Traditional, or Hybrid EOC What do you need to achieve?

An emergency operation centre (EOC) should enable people to respond to and plan the recovery from an emergency as effectively as possible. This is true of a brick and mortar EOC, a virtual EOC, and of a hybrid model. While there are many solutions, it is critical to begin with the right question. The question should be, “What do we need to achieve?”

En savoir plus

Ressources

Calian Cyber Security White Paper - Data and its importance to endpoint security copy

In today’s ever-connected world, the ability to access corporate data from virtually any device, such as tablets, phones and laptops, from any location, poses a significant threat to organizations and their cybersecurity teams. With the proliferation of connected devices on networks, including virtual machines, point-of-sale (POS) terminals and IoT devices, IT security professionals are increasingly spending more and more time managing and securing these devices and the variety of applications they deliver. This is a major challenge, as many of these are privately owned personal devices, making it difficult for cybersecurity teams to monitor and secure them. This is a security nightmare, as a personal device can expose an entire network to risk with just one security incident. And these devices are proliferating. In its 2011 Annual Security Report, Cisco found that three out of four employees worldwide have multiple devices, such as a laptop and smartphone, and one in three young professionals uses at least three different devices for work (Cisco, 2011). With the number of endpoints increasing— according to Intel there will be more than 200 billion connected devices by 2020—there is a corresponding increase in the vulnerability of the network to a vicious cyberattack from malware threats and online sources (Intel, n.d.). A frightening scenario, as Cisco’s report also found that the most popular mobile platforms—Apple iPhones and iPads and Google Android devices— are now targets for malware.

En savoir plus

Ressources

Calian White Paper - Identity and Access Management Essential In Today’s Data Driven Digital World

Identity and Access Management (IAM) is inextricably linked with big data. It is inevitable as organizations find themselves in the throes of being responsible for an ever-increasing volume of highly sensitive data; for instance, credit and debit card numbers, medical insurance information, and healthcare related information. According to Gartner, through 2017, 90% of the information assets from big data analytic efforts will be siloed and unleverageable across multiple business processes. Therefore, it is critical that organizations implement IAM technologies to help with the complexity and volume of big data while ensuring continued functionality. IAM technology includes password-management tools, security policy enforcement applications, provisioning software, reporting and monitoring apps, identity repositories, and more. By implementing IAM, organizations will be able to handle the complex relationship that exists from the need to generate business value while, at the same, protect intellectual property and individual privacy and, of course, being in compliance with all regulatory requirements.

En savoir plus

Ressources

Calian White Paper - How CASB 2.0 Helps Embrace The Cloud & Safeguard Sensitive Data

Over the past decade, computers and servers have dramatically and increasingly become more powerful, so much so that companies will never be able to use them to full capacity. So, why should organizations pay money on technology they will never use? Instead, cloud computing offers an appealing alternative: pay only for what is used, increase and decrease services as required. As the adoption of cloud computing has grown, so too have the risks. According to the Ponemon Institute and Accenture’s 2019 Cost of Cybercrime Study, malware and malicious insider-related cyber attacks jumped 12% in 2018, accounting for one-third of all cyber attack costs. The cost of malware to companies increased 11%, to more than US$2.6  million on average for each company. Malicious insiders—employees, temporary staff, contractors and business partners—jumped 15%, costing each company on average US$1.6 million (Ponemon Institute and Accenture, 2019).   While cyber threats to businesses have multiplied, the “next generation of cloud app security” has emerged to combat cyber criminals and safeguard the organization: Cloud Access Security Broker (CASB) 2.0 protects cloud apps and data—regardless of the user, location, or access device (Symantec, n.d.).

En savoir plus

Étude de cas | Solutions de cybersécurité

Calian Cyber Security Solutions - The Breach Report

In today's digital business environment, the need for enhanced cybersecurity is imperative. However, many companies continue to struggle with resilience, often experiencing breaches that lead to everything from compliance issues, to lost and stolen data and, ultimately, to brand damage and revenue loss. And though it is easy to read about these breaches, the causes and potential solutions are rarely identified. Each month, we spotlight a particular type of company, the breach they have experienced, and what they could have done to mitigate risk against the specific type of cyberattack—all to create better insight for the general public and to educate people on proper cybersecurity best practices.

En savoir plus

Ressources

Guide de reference rapide pour l es professionnels de la santé

En savoir plus

Ressources

Guide de reference rapide pour les familles de militaires

En savoir plus

Ressources

Guide de référence rapide pour les professionnels de la santé offrant des soins aux familles de militaires.

Guide de référence rapide pour les professionnels de la santé offrant des soins aux familles de militaires.

En savoir plus

Ressources

Guide de référence rapide pour les familles de militaires qui rencontrent un dispensateur de soins de santé,

Guide de référence rapide pour les familles de militaires qui rencontrent un dispensateur de soins de santé,

En savoir plus