Teams | Collaboration | Customer Service | Project Management

When the Breach Hits, Who Do You Call? Why Wire Partnered with OctopusCRX

There is a scenario that keeps CISOs and executives awake at night. Not the breach itself, but what happens in the minutes and hours after it. “It’s not if a breach happens, but how you respond when it happens.” Primary systems are down. Email is compromised. The collaboration tools your teams rely on every day are either locked or actively under attacker control. And leadership needs to make decisions that will determine how damaging the attack will be. This is what Wire was built for.

When Trust Becomes a Threat: The SonicWall Breach and the Case for Zero Trust Security

A recent security incident has raised serious concerns across the IT industry. Firewall vendor SonicWall confirmed that all cloud backups of its customers’ firewalls were stolen in a large scale breach. What was initially described as a limited issue has now turned into a data leak affecting every organization that used SonicWall’s cloud backup service.

How Data Breaches Impact Different Industries

No organization in the world is safe from a cybersecurity violation. But data breach impact differs across industries because of factors like regulations, nature of information compromised, and the sector’s role in national security and infrastructure. Understanding the consequences of data loss within specific industries can help enterprises create tailored strategies for cyber resilience and business continuity.

A Breach Too Far: What the UK MoD Data Leak Tells Us About Trust, Life, Tech, and Taxpayer Consequences.

We talk a lot about digital transformation. About the promises of smarter systems, AI safeguards, and the power of technology to protect us. But sometimes, it takes a story and a human story, to remind us what’s really at stake. In 2022, someone at the UK’s Ministry of Defence sat down at their desk and sent an email.

The 4 Types of Collaboration Habits That Make Information Security Breaches an Inevitability

Because of the ongoing COVID-19 pandemic, more people are working remotely than ever before. On the one hand, productivity hasn't really suffered as there are a large number of cloud-based tools that make it possible to be just as productive outside of the office as you are in it. But on the other hand, there are also certain types of collaboration habits that make security breaches no longer a matter of "if" but "when." Understanding what these are is the best way to avoid them at all costs.

Marriott's data breach and the importance of creating a "culture of security"

Impacting as many as 500 million customers, Marriott’s data breach is one of the largest in history. While we don’t yet know the root cause of the breach (which impacts hotels within the Starwood Group and is believed to predate Marriott’s acquisition of the group); what surprised many people is just how long the door was left open for the attackers – four years in total!

Do investors "punish" firms that suffer a data breach?

Nowadays, the press doesn’t have to look too far for the next cyber attack story! Whether it’s the surprise theft of customer data, like British Airways suffered this year, or a fresh Facebook hack, if there’s one thing we’ve learned this year – no one, regardless of size and sophistication, is immune to attack.