Tag: Cybersecurity

Fishing hook through Enter Key

Beware of Phishing Attacks—Actionable Advice to Protect Your Company’s Data

As the COVID-19 pandemic continues to unfold, we are all being forced to adjust our new daily routines, and this includes cybercriminals. Since the start of the crisis, security teams are reporting an overall rise in all types of cyberattacks, ranging from phishing, account takeovers, and even activating long-dormant ransomware attacks. Keeping in mind that […]

Man in office using personal devices for work.

Proper Cybersecurity Hinges on a Solid Bring Your Own Device (BYOD) Policy

As the number of small businesses targeted for cyberattacks continues to rise, it’s never been more important for organizations of all sizes to protect their sensitive data. A strong bring your own device (BYOD) policy should play a vital role in every company’s wider security strategy. Without it, your employees may be putting your company’s […]

Biometric Access Image

Integrate Operational Security and Cybersecurity to Best Address Changing Threat Landscape

To truly get to a place of total security, the importance of integrating your organization’s physical security and cybersecurity efforts is becoming increasingly apparent. For example, a motivated cybercriminal might start their research of your business online, but then choose to exploit a physical weakness they uncovered during the process. Are you confident that your […]

CFOs Are Increasingly Responsible for Cybersecurity

Cybersecurity is a top concern of businesses today. While often thought of as an IT issue, cyberdefense tactics often have surprising overlaps with business strategies inherent to the finance department. As a result, more chief financial officers (CFOs) are becoming cybersecurity custodians.

Login screen

New E-Mail Scam Attempts to Extort You Using Real (Old) Passwords

Cybercriminals using e-mail to lure you into parting with your money isn’t new. However, some of the newer e-mail scams have moved well beyond the whole “Nigerian Prince” trope. Many of these criminals have developed finely-tuned social engineering techniques to aid them in their mission. Now, there’s a hacker using a new method to make […]

Wireless Router in Home Office

Comcast Leaks Xfinity Customer Data Through Website Flaw

ZDNet reported on May 21, 2018 that a bug with a Comcast website was leaking personally identifiable information of some of its Xfinity customers. The vulnerability is associated with the website used by customers to register and activate their internet and cable service on routers provided by Comcast.

Researchers Examining Code

Georgia Governor Vetoes Controversial Cybersecurity Bill

Cybersecurity companies in Georgia can temporarily breathe a sigh of relief, as Governor Nathan Deal vetoed the controversial Senate Bill (SB) 315 legislation on May 8, 2018. The bill, which passed through Georgia’s legislation with overwhelming support, would have made unauthorized access to computer networks and systems a criminal act and allowed hacked companies to […]

Login screen

Facebook Hit with Two More Data Breaches

This has not been a great year for social media giant Facebook: the Cambridge Analytica scandal, congressional hearings over privacy practices, and the lead-up to the European Union’s General Data Protection Regulation rollout have thrust the company’s data collection practices into the spotlight. Not an enviable position for a company whose revenue model is based […]