The Global Risks Report 2016, your next suspense novel…

If you’re looking for a scary story, put down the latest spy novel and pick up the 11th edition of The Global Risks Report 2016, courtesy of the World Economic Forum.

The cyber attack threat takes center stage in North America, standing out as the most likely risk by far. The report reflects the perceptions of nearly 750 experts and decision-makers in the World Economic Forum’s constituencies surveyed in late 2015.

The risks perceived as the most likely to beset various regions this year include:

Social volatility
Interstate conflicts
Economic instability
The truth is that governments, businesses, organizations, and citizens in most parts of the world face pretty much the same dangers from cyber threats as their North American counterparts.

The Grant Thornton International Business Report 2015, for example, shows that cyber attacks are estimated to have cost Asia Pacific businesses $81 billion in the preceding 12 months, while firms in both the EU and North America saw revenue losses just over $60 billion.

Cascading Effects

Cyber dependency is a global trend in a world where digital businesses reside in increasingly connected, smarter and more automated environments.

That means that an entity’s risk is increasingly tied to that of other entities, making it harder for any single party to fully protect itself. This raises “the odds of a cyber attack with potential cascading effects across the cyber ecosystem,” the report states.

Consider also the impact of other risks that can lend more fuel to the cyber-attack flames. “Chronic and resurgent violence, conflicts, and economic and social volatility will remain prominent features of the current and future reality,” the report notes. Such conditions only make it easier for bad actors to gain new recruits to conduct cyber-attacks, be they criminal or terrorist in nature.

Raise Your Defenses

The World Economic Forum’s 2015 Executive Opinion Survey, out of 140 global economies, 18 put cyber-attacks on their list of top three risks and eight consider them a risk of highest concern for doing business. These are Estonia, Germany, Japan, Malaysia, the Netherlands, Singapore, Switzerland, and the United States.

Growing awareness is a good thing, but improved readiness to face these attacks is even better. If there’s a happy ending to this scare story, it is that defenses can be improved, although organizations must first fully grasp the extent of their cyber-security risks and the investments required to better manage those risks and build resilience.

The Global Risks report recommends actions that businesses can take to better defend themselves, such as:

Fostering greater cooperation throughout their value chains
Sharing cyber breach data with law enforcement
Building up security for under-protected areas like machine-to-machine connections
It’s unlikely that every organization can prevent every cyber attack, but companies should emphasize methods to identify and effectively mitigate them by streamlining mechanisms for:

Early detection
Response and recovery
Rapid mitigation
Better manage the consequences
That sounds like a good plan to us, and hopefully it’s one that organizations of every stripe will waste no time putting into action.


Summary:  Using the internet on an Android phone or tablet with the default settings leaves you very vulnerable online.

It means hackers can gain access to your personal information and control your device. A Virtual Private Network, or VPN, will protect your Android device.

A VPN encrypts your presence online so that someone cannot remotely put malware on your smartphone or tablet, download apps, or steal personal details.

To be fully protected online when using Android, get Express VPN today.




My Android smartphone started doing some really weird things last year.  It began to download apps all by itself.

When I started flicking through the home screens on my phone I noticed random app icons that were never there before.

I certainly never downloaded them and I have no idea how they got there. Even though I deleted the apps from the device, new apps kept reappearing every few days.

It was through a friend I realized my Android phone had been hacked and I needed protection.

Infiltrating an Android device is actually more straightforward than you might think.   For example, if you regularly use public Wi-Fi, it is easy for a trained hacker to gain access to your device.

Some common signs that your device has been hacked include:

  • Battery being drained quicker than usual due to malware
  • Internet data is being used up quicker than normal
  • Apps are being downloaded without your consent

If any of these issues are happening to your Android device then you need to take action.  You should run an anti-virus and clean your phone, but this is just a reactive measure.

You also need to be proactive to stop it from happening in the future.


There are so many VPN services out there that claim to be the best.  However, I speak from personal experience on what the top 3 services are for Android operating systems.

I take my security very seriously now.  After my device was hacked last year, I went through several VPN services before I found one that I was comfortable with.

I want to help you guys protect your data and your information and this is why I have decided to share my top 3 recommendations with you.


Express VPN should be your first choice to protect your Android device.

They have over 100 VPN locations in 78 countries, which provides you an incredible number of options regardless of your location.

Express VPN also provides its users unlimited bandwidth, unlimited speeds, zero logging of your Internet activity, ease of use and their reliability is through the roof with 99.9% uptime rate.

Needless to say, Express VPN is a reliable service that is perfect for your Android.

Express VPN is affordable, only $8.32 a month with a 12-month subscription and they offer a 30-day money back guarantee.

You also get world-class live chat and email support 24/7, and Express VPN boasts an impressive average response time of under 30 minutes.

Downloading the app and using the service is super easy, too. Since we are concerned with security we have to mention how Express VPN protects you, with 256-bit encryption.

The experts at Express VPN provide this high level of encryption to ensure your security and privacy.

When combined with their speeds and customer service, it’s easy to see why Express VPN is our top choice for your Android.

To get the best protection and service available for your Android, check out Express VPN here.


IPVanish also have an Android app but it is not as easy to use as Express VPN and also has a slow customer support team.

I have friends who are not great with new technology. It takes them a while to figure out how to use different apps and software.

With Express VPN they could open up the app and be secured in seconds.

It is much harder to use the IPVanish app. If you don’t have a lot of time to spare then you should get the Android software from Express VPN instead.

Another problem with IPVanish is that their customer service is really slow. I had issues installing the app on my Android device and need to contact their support team.

It took hours from submitting my support ticket to receiving a reply. With Express VPN I had a response in minutes and a solution to my problem within the hour.

If you want to use a reliable and simple Android app that will allow you to use the internet anonymously then get Express VPN.

You can visit the IPVanish website here.


– See more at:

Is the Cloud Secure?


There seems to be a common misconception about the cloud not being secure. Organizations are worried that by utilizing the cloud, they risk compromising important company information and confidential data. This could not be further from the truth. In fact, the cloud adds security to your environment and workspace. It is more secure than using your laptop! A global study of more than 4,000 organizations done by the Ponemon Institute Thales e-Security found that using the cloud for processing and storing critical data is almost an inevitable solution. More than half of all participants responded that their organizations already transfer sensitive or confidential data to the cloud while only 11% say that their organization has no plans of doing so. This is down from 19% two years earlier (Forbes).

Think of cloud security in terms of accidentally downloading a virus. When you do so on you work laptop, there is a good chance it will corrupt all your important files and information. You will then notice your computer running slowly and your private data is now compromised. However, if you were to download the same virus on your virtual laptop, the same thing should happen, right? Actually, that is wrong. As soon as you are aware that you have a virus, you can have your administrator pull your desktop back in time to before the virus was downloaded. Literally, you have the ability to revert back in time to the previous “image” of your desktop. You’re no longer vulnerable to that virus and your private data is no longer being compromised.

2When Sony Pictures Entertainment experienced a cyber-attack around the release of their movie “The Interview”, a hard and expensive lesson was learned. Not only were Sony’s eyes opened to the other security requirements for their industry, but businesses began considering the costs of managing and securing their information in-house rather than utilizing the cloud. The cyber-attack on Sony cost them around $100 million, not including the loss incurred by the hit to their reputation. They’ve had to invest an abundance of time and energy into rebuilding and diagnosing what really caused the security breach. The unending amount of fees they face such as responding to investigations from the Federal Trade Commission and Securities and Exchange Commission, and potentially state attorneys general, will definitely add up and put a financial burden on the company. It also caused an insurmountable loss of good-will for Sony. They also lost valuable information like strategic planning and trade secrets that affect a corporation’s profits. The hackers got ahold of confidential personnel records of its employees and various embarrassing emails from executives, all of which endangered Sony’s relationships with employees, talent, contractors and vendors (Logicworks).

Had Sony been utilizing cloud services, the situation would not have unfolded in the detrimental way that it did. Their valuable information would not have been lost as it would have been stored safely in the cloud. With the extensive security placed within the cloud, hackers would not have been able to access any of their confidential personnel records. This would have ultimately avoided the situation and saved Sony from the losses that occurred.

More and more organizations are moving to the cloud, and rightly so. The security only continues to improve and the risks of in-house assets continue to rise. Forbes says that 47% of marketing departments will have 60% or more of their applications on a cloud platform in two years. This year will be the year that the doubts of cloud security will be put to rest. Don’t put yourself in a Sony situation.

4 Myths About Mobility in the Workplace


The use of mobile devices for business can no longer be ignored. It’s changing the way business is done and that’s proving to be a positive thing. While many organizations have taken this development in stride, others are turning a blind eye to the inevitability of business mobility. Research and statistics show that technology brings many advantages to the table, and70% of professionals will work via smart, mobile devices by 2018. Why leave your professionals in the dust? Let’s debunk some of the major myths regarding mobility in the workplace.

Myth #1: Your employees will be less productive.

Today, your employees will actually be less productive if they’re chained to one location, without the option for mobility. The fact of the matter is that work productivity is a management problem, not a technology problem. 90% of business communications stretch far beyond the local workplace – so why limit employees to that local workplace? Imagine that an employee has to leave the office for a meeting or to make a sale. It’s counterproductive for that employee to head back to the office to complete and submit a form, and it’s not good for your customer service if employees in the field can’t access necessary data or complete deals on the spot. Business mobility strategies actually save time and can ultimately increase sales by giving employees the tools they need to make quick decisions. These capabilities also improve a business’ reputation.

64% of employees conduct some sort of business after hours at home. The magic of cloud computing and mobile devices is that they allow people to complete business tasks from any location, at any time. This actually increases productivity, allowing your employees to produce the same quality of work while away on a business trip or otherwise working remotely.

Myth #2: Mobility will make your business less secure.

Of course, as with most technology, there is risk associated with business mobility. But, as with most technology, risk can be addressed.

As you implement mobility into your business, you simply need to focus on risk management and security. By paying attention to Mobile Device Management, analytics, encryption, authentication and strict policies, you can implement a mobile strategy in a risk-free way.

Many studies show that employees are already using smart devices for work, with or without company approval. Rather than ignoring this fact or expecting to put a stop to this trend, address it by creating a company-wide policy. This should include the acceptable use of devices, security measures, technical standards, etc. Check out this article for guidelines on how to do BYOD the right way. This can (and probably should) be something that employees are required to sign off on. It should also be accessible to employees at all times.

Though employee policies tend to fall to the Human Resources department, this is a process that should include the IT team and others with a knowledge of technology and mobility. By combining policies with training on the importance of data security and user diligence, the risk of business mobility becomes no greater than that of other business initiatives.

Myth #3: All mobile devices are the same.

You may be thinking, “Well of course they’re not all the same,” but too many businesses today are treating all devices equally. People use different devices for different reasons. Compare the typical use of a laptop vs. smartphone vs. tablet. Of course there is overlap, but one policy won’t necessarily cover the essentials for all of these devices. They might each require unique management strategies, so a business should address that when moving forward with a mobility strategy.

Myth #4: Business mobility is optional.

The fact is that mobility is a huge part of the business world already. Almost 1/3 of enterprise data is accessed through mobile devices today. Organizations ignoring this fact might find themselves falling behind. Today, a great business strategy practically requires a mobility strategy, as it factors into employee productivity, company collaboration, business profits, customer service, marketing and much more. And any business expecting to grow will need to give employees the ability to access business data on the go. The trend towards mobility is driven by a desire for greater productivity and flexibility. To ignore it would be counterproductive for a business.

Don’t let your business down. Mobility in the workplace is important. By debunking these popular myths, we hope to help businesses adopt a mobility strategy that is both effective and safe.

National Computer Security Day: Is Your Business Protected?

We all use computers for something in our lives, but for businesses that rely on them, National Computer Security Day is a great reminder to review the security measures you have in place. We’ve discussed in several posts how important it is for your business to keep your security measures up-to-date, but in honor of the holiday,  we are going to focus on the different areas of security that might be at risk and how to best keep them safe.

Your email systems can be at risk for a number of reasons. If the server fails, you might not be able to access important information, and if any emails contain sensitive information, that information could be obtained by hackers.  There is also the age-old scam where people send viruses through email. Having a good email security system in place will make sure that emails containing questionable content will be blocked and quarantined. It will also ensure that your emails are backed up for easy access in case of emergency. You and your employees, with the right protection, are able to enjoy inboxes that are spam-free, contain no unsafe content and are properly backed up.

What are your security objectives? How much of a block do you want between your computer network and the outside world? Having a well-managed firewall lets you call the shots and ensures that your network is constantly being monitored. You can reference web-based reports at any time to identify any erratic behavior and address any issues.

If you have employees or clients who access your network remotely, you need your VPN to be secure. VPN security means that you can have people work from home without worrying, and that any data sent through the network will be encrypted so that it cannot be intercepted and obtained, avoiding any cyber-attacks.

Internet Policy
What types of websites would you like to allow your employees to access from the at-work network? Having a security system that enables internet-use management allows you to put filters on accessible URLs to avoid any legal issues or potential issues for your employees who might access dangerous sites. Some managers also employ internet policy management systems in order to boost workplace productivity.

Data Storage
Storing your business’s critical data in a place that is easily accessible, secure, and backed-up is imperative. Having a good managed security service means that your data will be backed-up on a regular basis, which reduces the amount of time it would take for your business to recover from a potential security threat, as well as the amount of time you’d be exposed to any risk. This is hugely important to have In place to ensure that your sensitive data is monitored and secure 24/7.

What steps is your business taking to avoid security threats? Are you using a managed security service? National Computer Security Day is the perfect time to make sure all of your security management efforts are up-to-date and that you have the right protection in place for your business. We offer a variety of managed security services and is always here to help you get started.


What is the Cost of a Cyber Attack?

Even as we shift our focus more and more toward tech security, it’s not perfect (and it’s unlikely that it ever will be). Even major corporations are at risk for – and have fallen victim to, quite recently – security breaches, whether it was in the form of leaked credit card information, hacked e-mails, or any other form of information compromise. A breach in cyber security is a threat to profits, to customer loyalty, and to the business’s security in general. Let’s take a closer look at what it means if your company’s virtual data isn’t secure.

The Average Loss per Cyber Attack is $3,220,000
…Not to mention that that number is higher in the United States. Here in the US, a major company can lose out on $5,850,000 when it suffers a major attack, which is the highest average net loss in the world. Germany pulls in second at $4,740,000 lost on average, and not even France or the UK can compare.

The Cost of Additional IT Security is Nothing in Comparison to Potential Losses
Obviously, the only way to prevent these massive losses due to cyber-attacks is to increase cyber security. The problem is that most companies don’t want to make this investment, as it sometimes comes with a bit pricetag. What these companies don’t realize is that, according to IBM, a stronger security presence could save a company up to $14 per lost data record. Bigger amounts of data compromised means bigger losses – but effectively, this means that the average company could increase their IT spending by $330,000 and still break even should there be an attack.

Companies Spend the Least on Data Center Systems
It’s plain to see that the digital world’s economy has grown at a staggering rate, thanks to the rise of mobile devices and cloud-based services. However, not many companies are investing on bigger, better data center systems. Telecom services rake in 8 times more revenue per year than data center systems; however, investing in better data center systems could mean investing in better security. Hopefully there is an upward trend to come.

Certain Industries Feel it the Worst
Every industry is at risk for data breaches, but a few are the biggest targets: banking, retail, IT, and hospitality. It seems that education, transportation, and entertainment, on the other hand, are the least at risk. Whether your business is in any of these industries should play a role in how seriously you’re taking cyber security.