Today’s Predictions for Tomorrow’s Internet: How To Keep Your Smart Devices Safe

When you first hire a personal assistant, they’re not all that helpful. Over time, they learn your daily routine, your needs and desires, and with that information, they make your life easier. Now, consider that your smart phone has morphed into your own mini personal assistant. Today’s smartphones are filled with potent sensors that collect data about you. Audio and image sensors, touch sensors, acceleration sensors, light, proximity, and location sensors all help your smartphone to get to know you and your habits. It knows where you go, when you go and how long you stay. It knows who you…

Reevaluate Your Cybersecurity Spend in 2017

Without a doubt, the most frustrating fact I face every day is this: Companies spend a meager 4.7% of their total security budgets on identity and access management (IAM) – while compromised identities are responsible for 80 percent of all data breaches. Eighty percent. This glaring disconnect is almost more than I can wrap my head around. Here’s the math: According to Gartner’s “Forecast: Information Security, Worldwide, 2015-2021, 2Q17 Update,” in 2015, companies spent nearly $84 billion on security. Approximately 4.7 percent of that ($4 billion) went towards identity and access management. This year, the total security spend is projected to…

A Culture of Cybersecurity Is Now Mission Critical

Whether you’re a small business, a large business, an academic institution, a non-profit or a government agency, it is now absolutely critical that you weave a fabric of security throughout your organization. You’ve heard it a thousand times, but it can’t be overstated: Culture is created at the top and trickles down into the organization. Today’s executive leadership must do more than issue edicts and implement tools. They must truly embrace security. Leaders must deeply understand and regularly communicate its importance to the health of the organization. Executives from all departments in all industries should make it a goal to…

I AM Centrify: Securing Enterprises and Our Country

At Centrify, we highlight the idea of “the team” – we work together and collaborate on building and selling technology that keeps organizations safe from cyberattacks. And whether we work in accounting, sales, marketing or engineering, we all are part of the Centrify team and mission. With over 400 employees worldwide, we all come from different backgrounds, have unique skillsets and partake in different interests and hobbies. Our company culture capitalizes on our differences and unites us through our passion, motivation and dedication (not to mention a little bit of goofiness now and then). Together, we make up the Centrify…

Equifax Breach Shows Firms Still Aren’t Getting the Basics Right Ahead of GDPR Deadline

As each week brings the 25 May 2018 deadline for GDPR compliance closer to hand, we seem to be faced with yet another report highlighting poor levels of preparedness among organisations. Recent findings reveal that an astonishing 64% of UK firms have not yet begun preparations for the sweeping new data protection law. Yet as shocking as these stats are, a far more effective way to focus the minds of IT security and business leaders is to highlight some recent big-name data breaches and consider how the companies affected would have been treated in a post-GDPR world. For Equifax, there’s particularly…

Yahoo Security Breach Take 3 (Billion Users That Is)

Remember that Yahoo breach last year, how it became the largest breach in history impacted over 1 billion users and knocked $350 million dollars off of the Verizon acquisition price? Turns out that EVERY account at Yahoo! including email, Tumblr, Fantasy and Flickr were impacted by the breach. That’s all 3 billion accounts vs just the 1 billion that were announced last year. Oath, the new brand for Yahoo, AOL and some other properties at Verizon issued a press release stating “The company recently obtained new intelligence and now believes…that all Yahoo user accounts were affected by the August 2013 theft.” This is…

The Equifax Disaster: Technical Controls — ICIT’s Synopsis of America’s In-Credible Insecurity

The following excerpts are from the Technical Controls section of Part-1 of the ICIT Equifax report entitled “America’s In-Credible Insecurity,” written by James Scott, Sr. Fellow, Institute for Critical Infrastructure (ICIT). Technical Controls Data Encryption Data should be protected according to its value and the potential harm that would result if it were stolen. Encryption does not prevent adversaries or insiders from exfiltrating data; however, it does deter or prevent attackers from exploiting the stolen data unless they spend significant additional resources breaking the encryption or stealing the decryption keys. Data Loss Prevention Data loss prevention is the employment of…

4 Tips to Stay Safe Online for National Cybersecurity Awareness Month

Help! I Love the Internet, But My Identity and Data Are Up For Grabs — Should I Just Unplug?! In honor of National Cybersecurity Awareness Month, we at Centrify are doing what we can to help you to be #CyberAware. The theme for the first week is around simple steps to online safety. Have you ever considered how to protect your privacy or identity while “online”? Have you noticed over the last few years how many times your data has been stolen or exposed by hackers? Have you observed that most of these breaches were from systems where you were…

Ushering in a Cybersecurity Renaissance with the World’s Top Experts

As CEO Tom Kemp mentioned in his recent blog post, Centrify has reengineered its annual user group event to more comprehensively tackle the many security issues facing organizations today. As the thought leader partner for CyberConnect 2017, ICIT has spent the last several months building a powerful curriculum which will empower business and technical leaders tasked with defending their organizations from digital threats. The result is a program that will inspire, educate, and ultimately help bring order to organizations developing strategies to survive in today’s cyber kinetic meta war. At ICIT, we believe we’ve entered a new paradigm where old…