It all started with a valentine. Earlier this year, my team and I aimed Cupid’s arrow at Businessolver employees to show them that—to borrow a phrase—there’s a thin line between love and bait: We orchestrated a phishing simulation via an email claiming to be from our CEO wishing them a happy Valentine’s Day. Was it […]
The threat of cybercrime impacts all businesses, no matter how big or small they are. The more advanced our operations become through modern software, the more open they are to outside attacks. But advancement is essential for progress, and even the buildings we do our work in are not as simple as they used to […]
There are just two types of companies in the world: those that have already been hacked, and those that will be. The only companies that can effectively fend off attacks are those that proactively invest in cybersecurity measures. Over the past decade, we’ve seen a sharp rise in smart office buildings and hybrid workforces. As […]
If you’re a server admin and many of the terms or concepts in this article are new to you, don’t feel bad; when I first got into cybersecurity, I was in the exact same position. At the beginning of my career, I had no idea just how much I didn’t know. Even now, some companies […]
Welcome to Terrible Cyber Tips, teaching you exactly what NOT to do online! Why is this, you ask? Well, just because cybersecurity is serious, it doesn’t mean it can’t be fun. Having fun engages people, and I’ve found that sharing these types of terrible tips somehow gained more attention than sharing “Don’t reuse your password” […]
Since the invention of the qwerty keyboard in the 1870s and the first employers implemented usernames and passwords in the 1960s, cybersecurity professionals have been behind the eight ball in the fight to protect organizations’ proprietary and personnel data. For decades, security leaders have offered clear training for employees regarding password strength, strong protocols for […]
With record-breaking attacks in 2021 according to Crowdstrike, end-users and organizations must remain vigilant to protect against cybersecurity threats. Gartner, an IT industry research firm, predicts that by 2025 more than 75% of organizations will face one or more attacks by bad actors due to the exponential growth in the threat landscape. According to an Identity […]
Whenever I read about a data breach, I immediately smell a cybersecurity process failure. In cybersecurity, we sure love our processes. We have them for firewalls, intrusion detection systems, IP scans, pen testing, zero trust architecture, and double secret two factor authentication probation, but I’m going to dive into the most exciting process we […]
On Aug. 25, President Joe Biden met with private-sector tech giants, such as Google and Apple, and education leaders to discuss the whole-of-nation effort and workforce training needed to address cybersecurity threats. Some of the technology companies pledged billions of dollars to support cybersecurity initiatives.
As enterprises respond to the acceleration of remote working, hybrid cloud adoption continues to increase—but security remains a persistent blocker. Marcella Arthur, Vice President of Global Marketing at Unbound Security, looks at how emerging approaches to key management are enabling enterprises to rethink and assert control over their cloud strategies.