Estimated reading time: 2 minutes
The prospect of geopolitical tensions leading to large-scale cyberattacks is a very real one. Nor would it be a new development – nation-states have been using cyberattacks as a warfare technique for more than a decade now. Perhaps the...
Estimated reading time: 3 minutes
A 2018 national audit of healthcare preparedness observed that only 45 percent of businesses followed the NIST Cybersecurity Framework, a policy framework for cybersecurity guidance for private sector organizations in the United States. No wonder then that the healthcare...
Estimated reading time: 4 minutes
Modern businesses depend heavily on the continuous availability of data be it of the customer, product, employee or financial. Data, in any form (files, emails, collaboration tool or database) must always be available when required. Just like any other asset, loss...