In light of the COVID-19 outbreak, companies have changed their core business operations and instituted new practices and procedures in the blink of an eye. The changes, perhaps unknowingly, have created risks that could jeopardize the protection of valuable trade secrets.
As the COVID-19 pandemic continues to unfold, we are all being forced to adjust our new daily routines, and this includes cybercriminals. Since the start of the crisis, security teams are reporting an overall rise in all types of cyberattacks, ranging from phishing, account takeovers, and even activating long-dormant ransomware attacks. Keeping in mind that […]
According to recent estimates by Cybersecurity Ventures, cybercrimes will cost businesses $6 trillion annually by 2021. This growth in cybercrime will force businesses to increase their cybersecurity budgets, reducing profits and increasing the cost of doing business.
As the number of small businesses targeted for cyberattacks continues to rise, it’s never been more important for organizations of all sizes to protect their sensitive data. A strong bring your own device (BYOD) policy should play a vital role in every company’s wider security strategy. Without it, your employees may be putting your company’s […]
To truly get to a place of total security, the importance of integrating your organization’s physical security and cybersecurity efforts is becoming increasingly apparent. For example, a motivated cybercriminal might start their research of your business online, but then choose to exploit a physical weakness they uncovered during the process. Are you confident that your […]
There is hidden value in security systems that many users do not tap into which can offset the cost of the initial investment in IP security equipment.
Cybersecurity is a top concern of businesses today. While often thought of as an IT issue, cyberdefense tactics often have surprising overlaps with business strategies inherent to the finance department. As a result, more chief financial officers (CFOs) are becoming cybersecurity custodians.
Cybercriminals using e-mail to lure you into parting with your money isn’t new. However, some of the newer e-mail scams have moved well beyond the whole “Nigerian Prince” trope. Many of these criminals have developed finely-tuned social engineering techniques to aid them in their mission. Now, there’s a hacker using a new method to make […]
ZDNet reported on May 21, 2018 that a bug with a Comcast website was leaking personally identifiable information of some of its Xfinity customers. The vulnerability is associated with the website used by customers to register and activate their internet and cable service on routers provided by Comcast.
Cybersecurity companies in Georgia can temporarily breathe a sigh of relief, as Governor Nathan Deal vetoed the controversial Senate Bill (SB) 315 legislation on May 8, 2018. The bill, which passed through Georgia’s legislation with overwhelming support, would have made unauthorized access to computer networks and systems a criminal act and allowed hacked companies to […]