C2 Fall 2021

XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop

Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low cost to execute and high value rate of return. Four percent might seem like a low number, but just one user falling victim to a phishing attempt is one too many.…

Read more

Reinvent the way you work with virtualized healthcare

Understand why healthcare trends are pushing IT to optimize data management and support a remote network of caregivers and patients more effectively—and why virtual technologies are the answer.

Healthcare is accelerating transformation as escalating industry demands and how services are accessed place a huge strain on existing infrastructure. Organizations are now racing to deliver personalized care to a rising number of patients, while their workforces take on novel infectious diseases and become increasingly mobile and dispersed.…

Read more

Cyber security awareness: How to establish an effective program

In today’s challenging environment, cyber security awareness programs must deliver much more than just the ability to check a compliance box. Here’s a straightforward model to ensure that your training is really changing behavior.

Many organizations believe that merely providing a series of videos or mandating an annual “must-watch” video will solve the cyber security awareness “problem.” I sincerely beg to differ.…

Read more

GDPR 2021 – Compliance and Penalties; 3 Years Later

The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based.
Read more

Ransomware Reality and Survival

Ransomware is making headlines everywhere. From the energy industry (Colonial Pipeline’s ransom payment of $4.4M) to the food industry (JBS Foods’ ransom payment of $11M), mounting data suggests this insidious trend may be getting out of control.
Read more

Making the move to zero trust architecture: 4 key considerations

New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business.

The broad concept of zero trust architecture has achieved wide acceptance in the marketplace, but exactly what it entails has been a subject of debate and even some confusion.

Fortunately, we’re moving beyond that now.…

Read more

State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act

Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017 to 2020. The report also noted that the 50% increase in attacks is likely a fraction of the true number of incidents because many go unreported. Research by Barracuda Networks indicates that 44% of global ransomware attacks in 2020 targeted municipalities.
Read more