<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=699131483885781&amp;ev=PageView&amp;noscript=1">
Back to Avast SMB Blog

Cybersecurity Monitor (Vol. 8): SMB Stats, Stories and News

The Monitor The Monitor , 13 November 2018

We scour the internet every week here at The Monitor, to stay up-to-date on IT security news. The result is a focused, curated collection of the latest cybersecurity news, stories and reports as it relates to businesses with anywhere from 2 to 2000 employees.

This collection aims to cut through the noise of cybersecurity stories, highlighting publications and reports about small and medium businesses.

In this week's edition, we find out that Americans don't prioritize company security, look into network security policies for health care, and a great story on the art of layered security!

This week's edition of The Monitor kicks it into high gear!

Americans don't prioritize employers' digital security - report

Insurance Business America | October 24, 2018

In a recent survey, respondents ranked protecting their work email dead last among their cybersecurity concerns.  One would think that it would be more important to protect company assets, and therefore livelihood for employees, but it's not a priority  Click for the full article

A playground for hackers; lessons on cybersecurity for schools
Education Executive | September 26, 2018

Young peoples’ lives are increasingly dominated by the digital world, which provides an enormous opportunity to advance education and enjoy digital entertainment. However, cyber criminals are ever-present and use sophisticated methods and tools to exploit vulnerabilities in our everyday applications and data defences.  Click for the full article

9 key components of a network security policy
Health Data Management | September 25, 2018

Securing patient information and protecting networks from hacking are of prime importance for healthcare organizations. For that to happen, the organization’s data security policies needs to published, understandable and enforceable. Click for the full article

The Art of Layered Security

EC-Council Blog | September 25, 2018

The goal of layered security is to increase the effectiveness of the security controls in place through a defensive strategy, which features multiple defensive layers designed to slow down an attacker. A series of different defenses are used to cover the gaps in the other protective capabilities.  Click for the full article

Want this delivered to your inbox?

Subscribe to The Monitor

Related articles

IT Security

5 ways IT service providers can boost security sales

Generating consistent, recurring revenue and finding new ways to continuously provide value to customers is something that many IT providers struggle with.

07 January 2020 16 min read

Security appliances – is "all in one" really all you need?

On premise and UTM security appliances often offer "all in one" protection. When in fact, most appliances sized for the mid-market fail to provide the essentials layers of security to adequately protect your clients. If you are using or planning to use an on-premise security appliance to keep your customers safe from cyberthreats, here are a...

05 September 2019 6 min read

The Hidden Costs of Network Security and UTM Appliances for SMBs

The interesting and attractive part of a network security appliance is that you can just plug it in to your network, get it configured, purchase a support contract with your hardware vendor, and then you're all set. When one takes a look with a focus on other costs, however, the flaws and blemishes become clear. Let's take a look at some of...

21 August 2019 8 min read