Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

Security guard working in retail environment.

Employee Theft in Today’s Climate

Many businesses who have the means are now moving to a remote work setup for their employees as a precaution for today’s climate. For businesses deemed “essential” like grocery stores and other retailers, employees are working with elevated risks and stress throughout the day. The increased pressure on employees both working both in-person and remotely […]

Business woman hacked computer

Cybersecurity Training Basics

In our highly digitized world, the potential for theft, fraud, and other crimes is often greater through a computer than it is in person. The amount of information and access controlled in the cyber realm, as well as the ability to strike anonymously from anywhere around the globe, means hacking, phishing, and other cybercrimes are […]

Facial recognition deepfake concept

Deepfakes Cost Companies Millions, and That’s Just the Beginning

Imagine someone in your billing department gets an urgent call. The CEO is requesting an immediate transfer of funds into a bank account due to an emergency with a very important client. The voice is convincing, and the client is real. Accounting does what it does best—transfers hundreds of thousands of dollars in record time. […]

Data Privacy Violation Concept

Not All Clouds Are Created Equal

Data breaches have always existed. They certainly predate computers, strange as that might seem, because a “data breach” is simply when information (usually of a sensitive nature) gets into the wrong hands. As long as humans have been storing information of any kind in any way, there have been other humans who have tried to […]

3D rendering Central Computer Processors CPU concept. Electronic engineer of computer technology. Computer board chip circuit cpu core. Hardware concept electronic device motherboard semiconductor

Non-Malware Attacks: What They Are and How to Protect Against Them?

Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]

Stressed out worker whose computer got hacked.

Right Now, Hackers Are Interacting with Your Employees—Are They Prepared?

Imagine a scenario in which an employee clicks a link in an e-mail and costs his or her employer $600,000. Unfortunately, this situation does not require one’s imagination. This is exactly what happened in Riviera Beach, Florida, when an employee clicked a link in an e-mail, and the government was crippled by a ransomware attack. […]

International

Supply Chain Threats Pose Unique Risks, Demand Unique Solutions

As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]