About Rosemarie O'Connor

This author has not yet filled in any details.
So far Rosemarie O'Connor has created 9 blog entries.

The Cost of a Cloud Migration

The Cost of a Cloud Migration Many businesses are evaluating the advantages of moving on-premises IT infrastructure to cloud computing, from startups to seasoned corporations and small to large-scale organizations. However, concerns over the cost of a cloud migration can hold some organizations back. Many of our clients have discovered that making this change has a variety of advantages, including ...

2022-02-16T20:42:10-05:00October 12th, 2021|

Why Vulnerability Intelligence Is Critical for Strong Cybersecurity

  A January 2021 analysis by Redscan found that more security vulnerabilities were disclosed in 2020 than in any other year – at an average rate of 50 per day. 57% of these vulnerabilities were classified as “critical” or “high severity”. The Verizon 2020 Data Breach Investigations Report (DBIR) made an important observation about unpatched vulnerabilities: “Unpatched vulnerabilities in your ...

2022-02-16T21:42:38-05:00October 8th, 2021|

Artificial Intelligence & Cybersecurity

Artificial Intelligence & Cybersecurity Artificial Intelligence (AI) is progressively being ingrained in the fabric of business and is being broadly applied across a variety of application use cases. However, not all industries are at the same level of AI adoption: the information technology and telecommunications industry are the most advanced, with the automobile sector trailing closely behind. Artificial Intelligence in ...

2022-02-16T21:08:06-05:00September 10th, 2021|

Reactive vs Proactive Cybersecurity

Reactive vs Proactive Cybersecurity Cybercrime is expected to cost the world's economy $10.5 trillion annually by 2025. Although it's almost impossible to wrap your head around a number like that, the reality is that security threats are real, and they affect virtually everybody, from large multinational corporations to individual businesses and everything in between. Cyberthreats are becoming considerably more dangerous. ...

2022-02-16T21:12:59-05:00August 30th, 2021|

Social Engineering Attacks on the Rise

Social Engineering Attacks on the Rise Social engineering techniques are various cyberattacks in which threat actors manipulate people into supplying sensitive data, account credentials, or enabling access to secure networks or systems to get sensitive information. Office files comprise 48% of all malicious email attachments, and spear-phishing was used by 65% of malicious actors as the primary mode of attack. In ...

2022-02-16T21:16:34-05:00August 25th, 2021|

​​Recent Rise of Ransomware Attacks

​​Recent Rise of Ransomware Attacks: What Are the Main Drivers? The rise of ransomware has taken the world by surprise. Ransomware is not a new phenomenon. The earliest recorded incident goes as far back as the 1980s. However, today’s ransomware operates at a scale and sophistication that makes it virtually unrecognizable from its early predecessors. Each year, ransomware attacks are ...

2022-02-16T21:22:19-05:00August 23rd, 2021|

What Is Passwordless Authentication?

Passwordless authentication ushers in a new age in security. A large percentage of data breaches are caused by passwords that are incorrectly set. Furthermore, forgotten passwords cost businesses a lot of money since users are unable to access important apps.   While solutions like multi-factor authentication have helped to decrease cyber-attacks, passwordless architecture offers businesses huge potential to increase employee productivity ...

2022-02-16T23:01:21-05:00August 4th, 2021|

Microsoft Print Spooler Patch and Security Implications

Microsoft Print Spooler Patch and Security Implications from Unpatched Systems At the start of July 2021, Microsoft began rolling out an emergency patch to resolve a critical vulnerability in its Windows Print Spooler service. Nicknamed PrintNightmare, the flaw was unintentionally disclosed when security researchers accidentally published exploit code. Whereas the Redmond-based tech behemoth has issued security updates to address the gap, ...

2022-02-16T23:06:34-05:00July 23rd, 2021|

Vulnerability Scanning vs. Penetration Testing – What you need to know

Vulnerability Scanning vs. Penetration Testing   Trying to secure your sensitive business data from cyber-attacks and threat actors has never been more complicated than it is today. To protect your business, you need a strategic cybersecurity plan, well-managed cyber resources, and a group of cybersecurity experts on your side.    End users and staff utilizing your business network are the biggest ...

2021-06-23T12:49:51-04:00June 23rd, 2021|
Go to Top