On Point

When It Comes to Intrusion Prevention, FortiGate IPS Stands Alone in the IPS Market

Posted by Traci Kent on Dec 4, 2017 3:21:14 PM

Malicious Intrusions Remain a Problem—and One That is Growing

Malicious intrusions are a big problem. 42% of security leaders in a recent Forrester Consulting study said they have experienced a security breach during the past two years. Another study by ISACA found that 80% of security leaders believe their organization will experience a security attack this year. This projection makes sense, considering that over half of those same security leaders believe the number of attacks is going to increase.

Read More

Cybersecurity Threats Within Your Organization

Posted by Traci Kent on Oct 27, 2017 12:00:00 PM

Cybersecurity Threats Within Your Organization

We are all aware of cybersecurity threats from anonymous persons outside our organization, but have you thought about threats from within your organization? Does your security training include implementing steps to minimize the threats from within? Below are a few examples of inside threats to consider and include in your security awareness program and processes.

Read More

Topics: Data Security

Evaluating Your Cybersecurity Risk

Posted by Traci Kent on Oct 24, 2017 4:12:31 PM

 Your cybersecurity risk may depend on the industry you are in and the size and location of your company. The more employees you have, the more locations, the more complexity and the more personal identifiable data your company maintains. the greater risk of a cybersecurity attack. To determine your company’s risk, you should evaluate the following:

  • If there is a governance model in place for making security decisions?
  • Does the Information Technology department having the right people with the right skills to both proactively prevent attacks and react if an attack occurs?
  • Are the departments aware of security requirements for selecting appropriate technologies?
  • Is there a level of process and program management throughout the company to ensure adherence to security procedures for new implementations?
  • Are employees aware of both facility and IT security controls?
  • Is there a training programs in place for continued employee security education?
  • Does the organization have a sound escalation and response process in place if a security breach occurs?

Evaluating your security risk is the first step in minimizing the impact of a cybersecurity attack.

Don Cornish is the Chief Information Security Officer for Dewpoint. He has an extensive background in IT security architecture and consulting based on his experience for a leading national and global organization. Don has security and compliance consulting experience addressing multinational business entities as well as the small to medium business segments. In addition, he is a Certified Information Systems Security Professional (CISSP).

Read More

Topics: Data Security

Dewpoint’s City of Lansing Team Helps to Connect Lansing Citizens with Local Government

Posted by Traci Kent on Mar 23, 2017 2:45:48 PM

Dewpoint’s City of Lansing Team Helps to Connect Lansing Citizens with Local Government

The City of Lansing launched the Lansing 3.0 initiative with a vision to make the city function better through the use of technology. Part of this initiative includes Lansing Connect, a more user-friendly website and a mobile app for residents to request city services and provide up to date information on community events and neighborhood resources. 

Read More