Thought Leadership

Ecommerce Retailers: It’s Time to Update to Magento v2.3

Ecommerce Retailers: It’s Time to Update to Magento v2.3

Contributed by David Mundhenk, Principal Security Consultant at Herjavec Group As of June 30, 2020, Magento, an eCommerce software vendor, is ending support for its flagship product Magento v1.0 which includes both Magento Commerce 1 (formerly known as Enterprise Edition) and Magento Open Source 1 (formerly known as Community Edition). With this change, eCommerce retailers around the world may begin to... Read More
July 7, 2020
WEBINAR: Extending from MSSP to MDR with MSSP Alert

WEBINAR: Extending from MSSP to MDR with MSSP Alert

According to Gartner, by 2024, 25% of organizations will be using MDR services, up from less than 5% in 2019.  Given the significant uptick in global cybercrime, it's clear that organizations are prioritizing threat detection and speed of response. As a result, many Managed Security Services Providers (MSSPs) have extended their Managed Services to include Managed Detection & Response (MDR). However, there is... Read More
July 2, 2020
Cybersecurity CEO: As COVID-19 Surged, So Did Demand for Cybercrime Fighters

Cybersecurity CEO: As COVID-19 Surged, So Did Demand for Cybercrime Fighters

The cybersecurity labor market bucks the trend. Los Angeles, Calif. – June 17, 2020 With unemployment rates plummeting globally, it’s hard to fathom a spike in demand for talent. But that’s exactly what the cybersecurity industry witnessed in the first half of 2020. A recent study by Gartner revealed that as the number of cases of COVID-19 spiked globally, so... Read More
June 22, 2020
10 Managed Services Trends You Need to Know in 2020

10 Managed Services Trends You Need to Know in 2020

Most organizations believe they will experience a security incident in the next 6-12 months. Recently, HG partnered with Cybersecurity Insiders to release the 2020 Managed Security Services Trends Report to highlight the opinions of IT security decision-makers across a variety of industries, such as healthcare, education, manufacturing, etc. We surveyed 400K security professionals to evaluate key challenges that organizations are... Read More
June 11, 2020
2 Years Later: How Has GDPR Impacted Your Business?

2 Years Later: How Has GDPR Impacted Your Business?

In May 2018, the European Union (EU) enacted a privacy regulation that would become a turning point for data protection and cybersecurity – the General Data Protection Regulation (GDPR). The goal of GDPR was to change how organizations conducted their data collection and storage practices. It applies to any business or individual that collects, stores, transfers, or processes personal data... Read More
June 4, 2020
Cybersecurity CEO: Identity Management is Here to Stay

Cybersecurity CEO: Identity Management is Here to Stay

Los Angeles, Calif. – May 25, 2020 Not long ago if you had asked any security pro about how they protect their perimeter, they would have said - firewalls. In fact, when I started Herjavec Group over 15 years ago, we were the first firewall reseller in Canada!   Today, the security landscape looks a lot different – especially with entire workforces forced to work remotely... Read More
May 25, 2020
CISA Alert: Top 10 Routinely Exploited Vulnerabilities, 2016-2019

CISA Alert: Top 10 Routinely Exploited Vulnerabilities, 2016-2019

Recently, the Cybersecurity & Infrastructure Security Agency (CISA), the FBI, and US government published an alert on the Top 10 Routinely Exploited Vulnerabilities identified by the US government between 2016 to 2019. The alert aims to provide organizations with a list of vulnerabilities, most of which are Common Vulnerabilities and Exposures (CVEs), that are being exploited repeatedly by cyber criminals.... Read More
May 13, 2020
The 4 Key Components of a Strong Vulnerability Management Program

The 4 Key Components of a Strong Vulnerability Management Program

A strong Vulnerability Management (VM) program allows organizations to identify potential security gaps including access points that threat actors leverage to gain entry into corporate networks, and then prioritize them for remediation. However, due to their complexity, most organizations experience challenges in building a robust VM program. According to Herjavec Group’s JR Cunningham, a strong Vulnerability Management program relies on... Read More
May 11, 2020
WEBINAR: Is Zero Trust Possible in a Remote Work Scenario?

WEBINAR: Is Zero Trust Possible in a Remote Work Scenario?

Organizations worldwide have moved to remote work scenarios in response to the COVID-19 pandemic. Moving to a remote workforce has presented CIOs and CISOs with key challenges surrounding the traditional perimeter security model. During this time, the health and safety of your enterprise workforce is paramount, but we know that security cannot take a back seat. In this webinar, we... Read More
May 1, 2020
Security Best Practices for Your Organization’s Video Conferencing Platform

Security Best Practices for Your Organization’s Video Conferencing Platform

As COVID-19 shifts organizations globally to remote work, there has been an inevitable increase in the use of video conferencing and team collaboration tools such as Zoom, Skype, Microsoft Teams, and WebEx. Threat actors are exploiting publicly known vulnerabilities in these remote work collaboration & communication tools to spread malware and gain access to restricted, private meetings. The Federal Bureau... Read More
April 17, 2020