Profile
Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Medical Data Theft Rising Because of Its Value

23 Feb, 2017

The risk is rising, but the medical industry is better recognizing the risk to patient data and is stepping up its cybersecurity efforts.

...More >

The Next Evolution of Ransomware Attacks

22 Feb, 2017

We will see shifts in ransomware, including how attackers will target victims, who they’ll target, and the role IoT will play in ransomware, both as an attack vector and attack target.

...More >

Addressing the Cybersecurity Career Gap

22 Feb, 2017

It seems like those interested in a career in cybersecurity should have no problems finding a job or advancing up the ladder. But problems in education, job listings and realistic expectations abound.

...More >

Your Customers Are Underestimating Security Threats

21 Feb, 2017

As consumers, and in turn as employees, we tend to be pretty haughty about our security IQ.  Nearly two-thirds say they don’t believe they were a victim of a cyberattack, which is highly unlikely.

...More >

Security Professionals Urge Small Businesses to Improve Security Efforts

16 Feb, 2017

Small businesses need to step up their security process before disaster hits.

...More >

Cybersecurity’s Human Side

15 Feb, 2017

One thing is clear so far during RSA. We need to think of cybersecurity in human terms, not just in data or technology.

...More >

Email Threat on the Inside

13 Feb, 2017

We can’t take our eye away from the role insiders play. Email is an essential tool (and for some of us a business lifeline), but it can also be extremely destructive.

...More >

Majority of Organizations Don’t Have Risk Management Plan

09 Feb, 2017

Enterprise understands that serious cybersecurity are threats lurking. Yet, 76 percent of these organizations reported that they don’t have a clearly defined risk management strategy.

...More >

Malware Infections Have Geographic Boundaries

06 Feb, 2017

Not just countries, but individual cities and geographic areas see significant differences in malware rates and methods.

...More >

Despite EMV Roll Out, Credit Card Related Identity Fraud Hits Record Numbers

02 Feb, 2017

It'll be interesting to see how e-commerce addresses the rise in identity fraud involving CNP transactions, especially in light of the rise of data breaches and compromised records.

...More >

Perception or Reality: Your Security System Is Probably Weaker Than You Think

31 Jan, 2017

If you're spending your security dollars on once-effective security tools, you may think you have a solid security defense because it used to work well. It’s focusing on the perception, rather than the reality.

...More >

The Most In-Demand Security Jobs and How to Get Them

31 Jan, 2017

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths.

...More >

Are You Spending Your Security Budget Wisely?

30 Jan, 2017

Does it feel like you are tossing money into a giant pit because no matter what you do or how much you spend, you just can’t get a good handle on cybersecurity protection?

...More >

Data Breach Numbers Hit Record Highs in 2016

26 Jan, 2017

While data breaches appear to be on the rise, not everyone agrees that they're our top cyber-incident concern. Other incidents include business disruptions caused by ransomware and DDoS attacks, compromised email, and the takeover of critical infrastructure.

...More >

With the Internet of Things Comes a Rise in DDoS Attacks

25 Jan, 2017

As long as IoT devices remain vulnerable, we must expect to see the rise in DDoS attacks. And we’ll see more because they are so effective in getting attention when they do happen to a major organization.

...More >

ISACA Audit Program Aligns with NIST Cybersecurity Framework for Improved Data Protection

25 Jan, 2017

The program is free to ISACA members and available for purchase to non-members for US $45. It is among 14 audit/assurance programs offered by ISACA aligned with COBIT 5, the leading framework for the governance and management of enterprise IT.

...More >

Improving Your Data Privacy Efforts for Data Privacy Day

23 Jan, 2017

The idea of this annual international event is to encourage businesses and consumers to recognize the need for data privacy and to promote education and training to enhance that awareness.

...More >

IoT Devices Vulnerable to Ransomware Attacks

19 Jan, 2017

As connected devices increase in popularity, they become a more attractive target to hackers and cybercriminals, and since cybercriminals are turning to ransomware as their attack of choice, we have to anticipate that the bad guys will use it for IoT attacks.

...More >

IoT’s Growing Pains Put Devices at Risk for Ransomware

18 Jan, 2017

The IoT is so at risk for ransomware because of three particular areas: the growth (and growing pains) of IoT, the evolution of ransomware, and end users who aren’t aware of the risks.

...More >

Gmail Phishing Attack Highlights Need for Multi-Factor Authentication

17 Jan, 2017

We should expect more phishing attacks like this, or at least increasingly sophisticated and more difficult to detect.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.