RESOURCES


home.aspx
   
Is it Dangerous to Rely Too Heavily on Predictive Analytics for Fighting Ransomware? IS IT DANGEROUS TO RELY TOO HEAVILY ON PREDICTIVE ANALYTICS FOR FIGHTING RANSOMWARE?

blog article

Jan 17, 2019

Ransomware is a rising threat to businesses all over the world. Between 2016 and 2017, the number of ransomware incidents increased by 350%. The FBI now estimates that there are 4,000 ransomware attacks every day. Digital security experts are desperately looking for new ways to thwart these attacks....

Read More

The U.S. Government Blaming Cyber Attacks on Russia May Cost One Business $100 Million THE U.S. GOVERNMENT BLAMING CYBER ATTACKS ON RUSSIA MAY COST ONE BUSINESS $100 MILLION

blog article

Jan 17, 2019

Governments attributing cyberattacks to specific countries usually ends in nothing more than a line in a news story. But sometimes these kinds of claims can have unforeseen consequences. The $100 Million insurance coverage lawsuit between Mondelez, the owner of brands such as Oreos and Nabisco, and ...

Read More

Avoiding Critical Security Risk Analysis Mistakes AVOIDING CRITICAL SECURITY RISK ANALYSIS MISTAKES

blog article

Jan 17, 2019

Healthcare organizations and their business associates must be careful to avoid making mistakes with their HIPAA security risk analysis in case they ever undergo a compliance review or breach investigation by federal regulators, says privacy attorney Adam Greene. “What I see a lot of – a...

Read More

Effective Data Security When Recycling Corporate E-Waste EFFECTIVE DATA SECURITY WHEN RECYCLING CORPORATE E-WASTE

blog article

Jan 17, 2019

In today's progressively digital world, data security is just as important as its physical counterpart. Sensitive data stored in servers, laptops, and any other form of e-waste can be compromised any time there's an attack by a malicious entity. Sensitive data can be any of the following: Tr...

Read More

BenefitMall Hit by Months-Long Data Breach BENEFITMALL HIT BY MONTHS-LONG DATA BREACH

blog article

Jan 17, 2019

The Dallas-based payroll firm BenefitMall announced on January 4 that nearly 112,000 customers may have had their personal information exposed during a four-month long data breach. The breach was discovered on October 11, when the company realized that several internal email accounts had been compro...

Read More

Modern Ransomware Goes After Data Backups MODERN RANSOMWARE GOES AFTER DATA BACKUPS

blog article

Jan 16, 2019

Ransomware is using a variety of methods to reduce or nullify the effectiveness of data backups, writes Maria Korolov at CSO. Restoring from a backup is one of the best strategies that organizations can use to recover from a ransomware attack, so it’s obvious why attackers would want to target...

Read More

Findings of our survey show that cyber awareness training is badly needed for organizations FINDINGS OF OUR SURVEY SHOW THAT CYBER AWARENESS TRAINING IS BADLY NEEDED FOR ORGANIZATIONS

blog article

Jan 15, 2019

Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the best of intentions, sometimes their actions can lead to major cybersecurity faux pas. But, how much of it is because of poor behavior or bad deci...

Read More

Government shutdown impacts .gov websites, puts Americans in danger GOVERNMENT SHUTDOWN IMPACTS .GOV WEBSITES, PUTS AMERICANS IN DANGER

blog article

Jan 14, 2019

If you are in the United States, then you likely already know that we are on our 24th day of a government shutdown. While it is considered a “partial” shutdown, there are still plenty of government workers who are furloughed, which impacts the services they run—both online and off....

Read More

Cyber Threats In The Banking Industry CYBER THREATS IN THE BANKING INDUSTRY

blog article

Jan 14, 2019

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in ot...

Read More

Fighting the Evolution of Malware FIGHTING THE EVOLUTION OF MALWARE

blog article

Jan 14, 2019

Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions of vulnerable IoT devices a...

Read More

The Evolution of Malware Identification THE EVOLUTION OF MALWARE IDENTIFICATION

blog article

Jan 11, 2019

Code is what allows website owners to customize their websites and make it unique. However, sometimes malware can sneak into that code, resulting in a potentially harmful impact to unsuspecting users. Using today’s techniques, how would you distinguish which code is good and which code is bad?...

Read More

5 CYBERSECURITY TRENDS FOR 2019 5 CYBERSECURITY TRENDS FOR 2019

blog article

Jan 11, 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice...

Read More

OpSec: A Vital Part of Any Cybersecurity Program OPSEC: A VITAL PART OF ANY CYBERSECURITY PROGRAM

blog article

Jan 10, 2019

We all have something to hide. Even though humans are social beings, there are some things we want to keep to ourselves, and it’s been like that since the beginning of humankind. In the digital world, the format in which those secrets are kept is what we keep in focus, in contrast to the &rsqu...

Read More

A Nasty Trick: From Credential Theft Malware to Business Disruption A NASTY TRICK: FROM CREDENTIAL THEFT MALWARE TO BUSINESS DISRUPTION

blog article

Jan 10, 2019

FireEye is tracking a set of financially-motivated activity referred to as TEMP.MixMaster that involves the interactive deployment of Ryuk ransomware following TrickBot malware infections. These operations have been active since at least December 2017, with a notable uptick in the latter half of 201...

Read More

Achieve Data Security with Strong Internal and External Perimeters ACHIEVE DATA SECURITY WITH STRONG INTERNAL AND EXTERNAL PERIMETERS

blog article

Jan 09, 2019

Securing your organization’s most sensitive content is analogous to securing a busy office building. If you’re in charge of security in an office building, you must protect your tenants amid a constant flux of employees and visitors. You must keep the building, its employees, and their p...

Read More

New Year, New Threats: 4 Cybersecurity Predictions For 2019 NEW YEAR, NEW THREATS: 4 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Jan 09, 2019

The new year has always been an important marker for cybersecurity professionals – just think back to Y2K and the widespread concern that every piece of technology might stop working at midnight on January 1, 2000. After a tough 2018, marked by extensive spam communication via both email and t...

Read More

What is Hybris Computer Worm? WHAT IS HYBRIS COMPUTER WORM?

blog article

Jan 09, 2019

Hybris Worm is a type of malware (computer worm) that multiplies by automatically replicating itsef. This type of computer worm has the capability to multiply not just within an infected system but also expanding to other systems that are connected to the same network. The mode of infection within t...

Read More

Opinion How to drive home the Importance of data security with company stakeholders OPINION HOW TO DRIVE HOME THE IMPORTANCE OF DATA SECURITY WITH COMPANY STAKEHOLDERS

blog article

Jan 09, 2019

For the modern business, there are few topics more important than data security. Without a proper appreciation for data security and all that it entails, you’ll find your business falling behind. But getting all of your employees and company stakeholders on board can prove to be a major challe...

Read More

Cyber Security Marketing Tactics That Actually Work CYBER SECURITY MARKETING TACTICS THAT ACTUALLY WORK

blog article

Jan 09, 2019

Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping. In fact, according to a Cybersecurity Market Report published ...

Read More

Good password security: the perfect New Year’s resolution for your business and employees GOOD PASSWORD SECURITY: THE PERFECT NEW YEAR’S RESOLUTION FOR YOUR BUSINESS AND EMPLOYEES

blog article

Jan 09, 2019

The New Year’s resolutions we stick to have a few things in common: they’re realistic, focused, and have clear benefits. That’s why improving company-wide password habits is a great resolution for 2019. According to the most recent data from Verizon, over 70% of employees reuse pas...

Read More

Ryuk ransomware attacks businesses over the holidays RYUK RANSOMWARE ATTACKS BUSINESSES OVER THE HOLIDAYS

blog article

Jan 08, 2019

While families gathered for food and merriment on Christmas Eve, most businesses slumbered. Nothing was stirring, not even a mouse—or so they thought. For those at Tribune Publishing and Data Resolution, however, a silent attack was slowly spreading through their networks, encrypting data and ...

Read More

Tips on Cybersecurity Vendor Risk Management for the Board of Directors TIPS ON CYBERSECURITY VENDOR RISK MANAGEMENT FOR THE BOARD OF DIRECTORS

blog article

Jan 08, 2019

Think about your vendors. Each one presents a unique risk to you. Whether it’s a risk to information security or the availability of your company’s product or service, all vendor services come with a specific level of risk. In the current technological environment, vendors are not only h...

Read More

Scheduled Network Maintenance: How Does It Affect Your Customer’s Business SCHEDULED NETWORK MAINTENANCE: HOW DOES IT AFFECT YOUR CUSTOMER’S BUSINESS

blog article

Jan 08, 2019

As a managed services provider (MSP) it is your responsibility to manage and maintain not only the endpoints on your clients’ networks but also the networks themselves. This may not be terribly important for very small businesses, especially if they are just starting out. However, as your clie...

Read More

SAP Security Notes January ‘19: First Critical Note for SAP Cloud Connector and Mobile Patching SAP SECURITY NOTES JANUARY ‘19: FIRST CRITICAL NOTE FOR SAP CLOUD CONNECTOR AND MOBILE PATCHING

blog article

Jan 08, 2019

Today is the first SAP Security Patch Day for 2019 and 18 security notes were released, including one that was published during the month after the last Patch Day. This month, several platforms that are not usually part of the Patch Day have Security Notes published, including SAP Cloud Connector an...

Read More

IoT Cybersecurity Challenges and Solutions IOT CYBERSECURITY CHALLENGES AND SOLUTIONS

blog article

Jan 08, 2019

The Internet of Things (IoT) is simply an interconnected array of electronic devices that are linked by the Internet, through which they can transmit and receive data. The original “thing” was a Coca Cola vending machine that was able to report back to HQ how many bottles of soda were le...

Read More

This Era Strongly Demands for Advanced Security Solutions – Let’s See Why THIS ERA STRONGLY DEMANDS FOR ADVANCED SECURITY SOLUTIONS – LET’S SEE WHY

blog article

Jan 07, 2019

In today era of 2019, companies are turning towards advanced security solutions because of the surging in data breaches. Lots of updation and intelligence systems are required in monitoring products for malware protection and to perform auto defensive actions. This post is going to aware readers tha...

Read More

The Difference Between Data Privacy and Data Security THE DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY

blog article

Jan 07, 2019

Repeat after me, data security is not privacy. Privacy is also not data security. These two terms are often used interchangeably, but there are distinct differences as well as similarities. Yes, data security and privacy have a common goal to protect sensitive data. But they have very different appr...

Read More

Introducing the Defender INTRODUCING THE DEFENDER'S DIGEST

blog article

Jan 07, 2019

With cyberattackers actively targeting SAP and Oracle ERP systems and more organizations experiencing breaches, the ERP cybersecurity industry is constantly changing. Staying up to date with best practices can be a struggle. Onapsis would like to introduce the Defender’s Digest, a new monthly ...

Read More

New Year – Mastering Privacy and Data Security in 2019 NEW YEAR – MASTERING PRIVACY AND DATA SECURITY IN 2019

blog article

Jan 07, 2019

Privacy Compliance & Data Security - A Fox Rothschild Blog. 2019 presents businesses with new cybersecurity and privacy challenges: rapid advances in technology, sophisticated new cyberattacks and stricter privacy regulations here and around the world, just to name a few. Businesses that fail to...

Read More

Here are some predictions for the new year HERE ARE SOME PREDICTIONS FOR THE NEW YEAR

blog article

Jan 07, 2019

Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutions, it would be best if you took a step back to analyze a few predictions and trends that may i...

Read More

How to Improve Blockchain Security HOW TO IMPROVE BLOCKCHAIN SECURITY

blog article

Jan 07, 2019

In 2014, Mt. Gox, one of the largest cryptocurrency exchanges (managing approximately 70% of all transactions in Bitcoin) had been the victim of successful hacking attempts for a period of three years, and Mt. Gox’s customers lost 750,000 Bitcoins. Bitcoin lost over a third of its value when t...

Read More

How To Pick A Data Backup Method For Your Enterprise HOW TO PICK A DATA BACKUP METHOD FOR YOUR ENTERPRISE

blog article

Jan 07, 2019

The digital age is all about data security and privacy, but that doesn’t mean businesses and private individuals have much of a clue when it comes to properly back up their information. Despite the fact that finding the right data backup method isn’t always a breeze, it doesn’t hav...

Read More

3 Top Cybersecurity Stocks to Buy in 2019 3 TOP CYBERSECURITY STOCKS TO BUY IN 2019

blog article

Jan 07, 2019

Okta (NASDAQ:OKTA) is the leading provider of enterprise identity-management services. More than 5,600 businesses rely on Okta to manage and secure the digital access rights to their network. Think passwords, login processes, and employee on- and off-boarding procedures. Okta makes all this simpler ...

Read More

VPN vs Antivirus: Which is a Bigger Cyber Security Market and Which Does Your Company Need? VPN VS ANTIVIRUS: WHICH IS A BIGGER CYBER SECURITY MARKET AND WHICH DOES YOUR COMPANY NEED?

blog article

Jan 07, 2019

With cyber security being the rage these days, choosing out of the many programs that are popping up with the promise of offering optimal protection becomes a dilemma. Even more, the choice between picking out a recommended antivirus and sticking with the more traditional way of protecting your comp...

Read More

Security trends to pay attention to in 2019 and beyond SECURITY TRENDS TO PAY ATTENTION TO IN 2019 AND BEYOND

blog article

Jan 03, 2019

Software security requires good hygiene and constant diligence to protect your organization and users from known threats; it also requires working proactively to identify and address emerging risks. Here at Google Cloud, we help you do both. We build products that make security easy—from autom...

Read More

The Future of Cybersecurity – A 2019 Outlook THE FUTURE OF CYBERSECURITY – A 2019 OUTLOOK

blog article

Jan 03, 2019

From the record-breaking number of data breaches to the implementation of the General Data Protection Regulation (GDPR), 2018 will certainly go down as a memorable year for the cybersecurity industry. And there have been plenty of learnings for both the industry and organisations, too. Despite havin...

Read More

The 4 stages of cyber resilience THE 4 STAGES OF CYBER RESILIENCE

blog article

Jan 03, 2019

Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either repelled the attack or faced the consequences head-on. However, with data breaches becoming more common a...

Read More

Is Your Cybersecurity Level Capable of Standing in Multi-Cloud Infrastructures Future? IS YOUR CYBERSECURITY LEVEL CAPABLE OF STANDING IN MULTI-CLOUD INFRASTRUCTURES FUTURE?

blog article

Jan 03, 2019

The popular advantages of working on a multi-cloud infrastructure are – Cloud service provider flexibility, optimized workloads, no cloud vendor lock-in, and cost efficiency. Someone said that “multi-clouds expand the attack surface area and raise the total number of Cybersecurity holes ...

Read More

Click2Gov breaches show the power of zero-days CLICK2GOV BREACHES SHOW THE POWER OF ZERO-DAYS

blog article

Jan 03, 2019

Just about every organization, including the biggest of all—government at all levels—encourages you to pay your bills online. You know the pitch: It’s easy! It’s quick! It’s convenient! It saves paper! And, they also say, it’s safe and secure! Except when it isn&r...

Read More

Hackers Hijack Chromecast Devices and Smart TVs via Exposed UPnP HACKERS HIJACK CHROMECAST DEVICES AND SMART TVS VIA EXPOSED UPNP

blog article

Jan 03, 2019

A pair of hackers has launched a campaign that displays rogue messages on people’s smart TVs encouraging them to subscribe to a popular YouTube channel. The attack doesn’t seem to be malicious and is part of a larger campaign to promote PewDiePie, the YouTube channel with the largest num...

Read More

Making – And Keeping – Your Cybersecurity Resolution MAKING – AND KEEPING – YOUR CYBERSECURITY RESOLUTION

blog article

Jan 03, 2019

We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute m...

Read More

The Surprising Role Of AI In Cybercrime THE SURPRISING ROLE OF AI IN CYBERCRIME

blog article

Jan 03, 2019

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active rol...

Read More

The new landscape of pre-installed mobile malware: malicious code within THE NEW LANDSCAPE OF PRE-INSTALLED MOBILE MALWARE: MALICIOUS CODE WITHIN

blog article

Jan 02, 2019

Here’s a scary thought: Mobile devices may soon come with pre-installed malware on required system apps. While it might sound like a grim foretelling, pre-installed mobile malware is an unfortunate reality of the future. In the past, we’ve seen pre-installed malware with the notorious Ad...

Read More

New Windows Zero-day Bug Allows Deleting Arbitrary Files NEW WINDOWS ZERO-DAY BUG ALLOWS DELETING ARBITRARY FILES

blog article

Jan 02, 2019

A security researcher released exploit code for an unpatched bug in Windows that could allow an attacker with limited privileges to delete system files. Exploiting the bug requires winning a race condition on the machine, so a successful exploit can take some time as it will retry until it succeeds,...

Read More

The Changing Landscape of Automated Attacks on Web and Mobile Apps THE CHANGING LANDSCAPE OF AUTOMATED ATTACKS ON WEB AND MOBILE APPS

blog article

Jan 02, 2019

In recent years, we have witnessed an unprecedented surge in automated attacks targeting online businesses. These attacks are aimed at validating stolen payment card details, scraping content, taking over accounts and sometimes even slowing down the target website. In the last post, I had highlighte...

Read More

Common Exploits Found in a Penetration Test COMMON EXPLOITS FOUND IN A PENETRATION TEST

blog article

Jan 02, 2019

How to Remediate Vulnerabilities to Secure Your Business. Let’s imagine that your company just completed a penetration test and you are left with an assessment report from the vendor with a list of exploits and vulnerabilities to remediate. You are trying to get a full understanding of the rep...

Read More

OSINT Framework: The Perfect Cybersecurity Intel Gathering Tool OSINT FRAMEWORK: THE PERFECT CYBERSECURITY INTEL GATHERING TOOL

blog article

Jan 02, 2019

Intel and reconnaissance are among the first steps taken in any cybersecurity research effort, and as we’ve seen in our previous post, OSINT plays a big role in data collection. So what is OSINT? While there are tons of public resources for getting information about any individual or organizat...

Read More

Various steps involved in Implementing a Cyber Kill Chain VARIOUS STEPS INVOLVED IN IMPLEMENTING A CYBER KILL CHAIN

blog article

Jan 02, 2019

We are living in a world where everything is networked together, from online transactions to government infrastructure, and therefore, network protection will no longer be an optional extra. Today, cyber-attack has become an international issue, as high-profile infringements have caused many problem...

Read More

Beware! Your website might be delivering Emotet malware BEWARE! YOUR WEBSITE MIGHT BE DELIVERING EMOTET MALWARE

blog article

Dec 29, 2018

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challeng...

Read More

The New Mob is on the Internet THE NEW MOB IS ON THE INTERNET

blog article

Dec 28, 2018

According to the Secureworks State of Cybercrime Report 2018, the bulk of cybercrime-related damage around the globe is perpetrated by a small group of well-organized, dangerous, and covert criminal groups. What’s worse, the report shows that the boundary between a nation-state and cybercrimin...

Read More

Cyber Security and Privacy Threats & How We Fought Them | 2018 in Review CYBER SECURITY AND PRIVACY THREATS & HOW WE FOUGHT THEM | 2018 IN REVIEW

blog article

Dec 28, 2018

It was the best of years, it was the worst of years… Today we’re doing a recap of 2018. Treat yourself to a cup of hot drink, sit back, and enjoy our review of these past 12 months. What new cyber threats arose? How did internet community address them? What did KeepSolid VPN Unlimited d...

Read More

White House Cybersecurity Strategy: The Essence WHITE HOUSE CYBERSECURITY STRATEGY: THE ESSENCE

blog article

Dec 28, 2018

The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity.  Let’s look its four “pillars”, and their key elements. 1. Protecting the American People, Homeland, and the American Way of...

Read More

Five Ways to Increase Your Cyber Health in 2019 FIVE WAYS TO INCREASE YOUR CYBER HEALTH IN 2019

blog article

Dec 27, 2018

You are the Internet. It’s easy to get lost in the jargon, or the acronyms, or the fast-paced upgrades, but it doesn’t make it any less true. The Internet isn’t just a bunch of servers sitting in a dusty warehouse somewhere, or the flickering bars on the corner of your phone (which...

Read More

Top 5 Cybersecurity Priorities for 2019: Ponemon Study TOP 5 CYBERSECURITY PRIORITIES FOR 2019: PONEMON STUDY

blog article

Dec 27, 2018

We asked 2,410 IT and cybersecurity decision-makers in six countries to identify their top cybersecurity and governance priorities for the New Year. Here’s what we learned. What are your top cybersecurity concerns for 2019? Tenable commissioned Ponemon Institute to conduct a survey of 2,410 IT...

Read More

Exploits on the Rise: SAP and Oracle EXPLOITS ON THE RISE: SAP AND ORACLE

blog article

Dec 27, 2018

Whatever role you play in ensuring your organization runs smoothly, the biggest risk to the business is not knowing the risks. ERP systems SAP and Oracle have seen a 100% increase in available public exploits over the last three years and a 160% increase in the activity and interest in ERP-specific ...

Read More

Software Supply Chain Threats Are On The Rise SOFTWARE SUPPLY CHAIN THREATS ARE ON THE RISE

blog article

Dec 27, 2018

Large organizations in both the public and private sector routinely work with subcontractors for everything from the supply of manufactured components to the supply of custom computer code. For example, government agencies may contract with software development companies for the supply of code used ...

Read More

The Top 5 Best DNS Servers for improving Online Privacy & Security THE TOP 5 BEST DNS SERVERS FOR IMPROVING ONLINE PRIVACY & SECURITY

blog article

Dec 25, 2018

We recently ran two Twitter polls to ask what you thought the best DNS servers were in terms of online privacy and security. ISPs (Internet Service Providers) generally offer DNS services to their customers, so when you don’t set up DNS servers on your computer or router, your DNS queries will...

Read More

6 Alternative Authentication Methods to Supersede Passwords 6 ALTERNATIVE AUTHENTICATION METHODS TO SUPERSEDE PASSWORDS

blog article

Dec 24, 2018

Back in 2004, Bill Gates said people would rely less and less on passwords, because “they just don’t meet the challenge.” And really, passwords, the world’s most common way of authentication, have been becoming obsolete over the past decade or so. Judging from numerous securi...

Read More

Adware Definition ADWARE DEFINITION

blog article

Dec 24, 2018

A software application that shows unsolicited advertisements while a program is running is termed as an adware. In most cases, the adware comes implanted inside a free software supported by advertisements. These ads start to show up in pop-up windows or on a toolbar on a computer or browser. Though ...

Read More

Unmanaged Virtual Private Server: Keeping It Secure UNMANAGED VIRTUAL PRIVATE SERVER: KEEPING IT SECURE

blog article

Dec 21, 2018

Virtual Private Servers (VPS) is undoubtedly the future of web hosting. A VPS refers to a virtual machine or virtual server, installed on a computer that is simultaneously accessed by many end users or websites seems to be a dedicated server. Also referred to as a virtual dedicated server (VDS), the...

Read More

Cybersecurity Trends to Watch Out for in 2019 CYBERSECURITY TRENDS TO WATCH OUT FOR IN 2019

blog article

Dec 21, 2018

The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. C...

Read More

58% increase in companies affected by BEC attacks 58% INCREASE IN COMPANIES AFFECTED BY BEC ATTACKS

blog article

Dec 21, 2018

Data from Lloyds Bank has revealed a 58% increase in BEC (business email compromise) attacks in the year to date. It is important to note that the “true scale of the problem is likely to be much larger” as this is only reported fraud. Key findings. The average loss to a commercial custom...

Read More

All You Need to Know about the NIST Cybersecurity Framework ALL YOU NEED TO KNOW ABOUT THE NIST CYBERSECURITY FRAMEWORK

blog article

Dec 21, 2018

The last few years have transformed cybersecurity and data protection from niche concerns to major problems as both individuals and organizations suffered from an unprecedented wave of cyberattacks and data theft. Governments around the world have stepped up and have begun introducing legislation th...

Read More

The Email Security Education Series: The Basics THE EMAIL SECURITY EDUCATION SERIES: THE BASICS

blog article

Dec 20, 2018

Your customers rely on email for their day-to-day business operations, and cybercriminals know this.  This is why some of the biggest online threats come from spam and email-borne malware. In fact, phishing and spear phishing represent the number one attack vector threatening business all over ...

Read More

Your checklist for responding to and reporting data breaches YOUR CHECKLIST FOR RESPONDING TO AND REPORTING DATA BREACHES

blog article

Dec 20, 2018

There is a lot you need to do after you discover a data breach, so it’s a good idea to keep a checklist. This will help you keep track of your progress during a hectic few days and ensure that you’ve done everything necessary to comply with the EU GDPR (General Data Protection Regulation...

Read More

Social Engineering Methods Used for Malware Distribution SOCIAL ENGINEERING METHODS USED FOR MALWARE DISTRIBUTION

blog article

Dec 20, 2018

Social engineering has been one of the most effective ways to spread malicious software lately. Whereas software vulnerabilities tend to be patched sooner or later, things don’t appear so promising when it comes to human “exploits.” For example, Microsoft has rolled out a patch tha...

Read More

Data Security Compliance for NBFCs DATA SECURITY COMPLIANCE FOR NBFCS

blog article

Dec 20, 2018

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry out financial services ranging from asset finan...

Read More

3 cyber security takeaways from 2018 3 CYBER SECURITY TAKEAWAYS FROM 2018

blog article

Dec 20, 2018

2018 is coming to an end. And there’s been lots of big cyber security developments. Hotel hacks, the GDPR, low-level vulnerabilities and cold boot attacks all made headlines in the last year. Janne Kauhanen, host of F-Secure’s Cyber Security Sauna podcast, invited several F-Secure expert...

Read More

2018 in Review: The Top Four Takeaways in Security 2018 IN REVIEW: THE TOP FOUR TAKEAWAYS IN SECURITY

blog article

Dec 20, 2018

2018 in Review: The Top Four Takeaways in Security, and What Does it Mean for 2019? It’s hard to believe that 2018 is almost over. While many of us may remember 2018 as  “The Year of GDPR,” there were many other security developments and trends, many of which could affect our ...

Read More

WHAT’S GOING TO CHANGE IN CYBERSECURITY IN 2019 (AND WHAT WON’T) WHAT’S GOING TO CHANGE IN CYBERSECURITY IN 2019 (AND WHAT WON’T)

blog article

Dec 19, 2018

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security industry it’s hard to predict exactly what cyber...

Read More

Download for a data breach. How to avoid unwanted data acquisition in downloadable documents DOWNLOAD FOR A DATA BREACH. HOW TO AVOID UNWANTED DATA ACQUISITION IN DOWNLOADABLE DOCUMENTS

blog article

Dec 19, 2018

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business Development an RFP. While it’s often as common as replying to an email, employees often forget ...

Read More

The Role of Cyber Intelligence in Election Security THE ROLE OF CYBER INTELLIGENCE IN ELECTION SECURITY

blog article

Dec 19, 2018

Elections. Quite the hot-button issue these days. Step into the proverbial public square, or be invited behind closed doors, and you’ll find elections are being discussed with fervor. With all the extra attention, it’s important to note that more eyes will be on security than ever &ndash...

Read More

5 data breaches that could have been avoided in 2018 5 DATA BREACHES THAT COULD HAVE BEEN AVOIDED IN 2018

blog article

Dec 19, 2018

2018 has been a year of ups and downs for information security. We’ve seen the enforcement of the EU’s GDPR take full effect, bringing the importance of protecting sensitive data to the forefront of people’s minds, with practical steps being taken to ensure compliance. However, whi...

Read More

How Big Data is the Future of Business Security HOW BIG DATA IS THE FUTURE OF BUSINESS SECURITY

blog article

Dec 18, 2018

Over time, instances of hacks seem to be breeding at a higher rate. Research in 2016 showed that over a million incidents of cyber crimes were reported in that year alone. Over time, malware attacks have become more challenging to fight and detect and are more sophisticated than before. One of the c...

Read More

Predictions 2019: "The era of simple Android malware is over" PREDICTIONS 2019: "THE ERA OF SIMPLE ANDROID MALWARE IS OVER"

blog article

Dec 18, 2018

Colorful packaging is not only available for Christmas - but also used by malware throughout the year. Android Malware becomes more sophisticated users, and online banking is also tricky. Our Security Predictions for 2019 give an overview of the biggest threats for customers. The malware ecosystem r...

Read More

What is Passive DNS? And Why Should You Use a Passive DNS API? WHAT IS PASSIVE DNS? AND WHY SHOULD YOU USE A PASSIVE DNS API?

blog article

Dec 18, 2018

Cybersecurity attacks and network threats are on the rise every year. Even if you’re not aware of it, the bad guys are always lurking in the background, looking for ways to attack your web server, DNS infrastructure and domain names. As seen in our Types of DNS Attacks blog post, the DNS syste...

Read More

What is IoT Security and Why is it Important for Businesses? WHAT IS IOT SECURITY AND WHY IS IT IMPORTANT FOR BUSINESSES?

blog article

Dec 18, 2018

The Business of IoT Security. Way before IoT security was on everybody’s mind, something happened in late 2016 that was straight out of a sci-fi movie: the Internet went down. Well, only parts of it, but it was pretty big. So big, in fact, that it has been described as the biggest DDoS attack ...

Read More

An Inside Look At The IPSec Tunnel AN INSIDE LOOK AT THE IPSEC TUNNEL

blog article

Dec 18, 2018

The Internet is an integral part of daily business for most organizations today, and along with this comes an inherent vulnerability to cyber attacks. In the face of growing incidents of cybercrime, enterprises struggle with the quandary of how to keep data secure while avoiding disruptions to daily...

Read More

It didn IT DIDN'T TAKE LONG FOR THE LAWSUITS TO START ROLLING IN

blog article

Dec 17, 2018

Most people are impressed by size. Specifically, large manmade or natural wonders, large statues or artwork, large bank accounts or net worth, large customer bases or revenues will all make the news in a positive light. Unfortunately, when it comes to cybercrime, we all gasp when we see large number...

Read More

What is the General Data Protection Regulation? Understanding and Complying with GDPR Requirements WHAT IS THE GENERAL DATA PROTECTION REGULATION? UNDERSTANDING AND COMPLYING WITH GDPR REQUIREMENTS

blog article

Dec 17, 2018

Learn about the General Data Protection Regulation (GDPR) and the requirements for compliance in Data Protection 101, our series on the fundamentals of information security. A DEFINITION OF GDPR (GENERAL DATA PROTECTION REGULATION). The General Data Protection Regulation (GDPR), agreed upon by the E...

Read More

The Year Ahead: Cybersecurity Trends To Look Out for In 2019 THE YEAR AHEAD: CYBERSECURITY TRENDS TO LOOK OUT FOR IN 2019

blog article

Dec 17, 2018

A Proven Record Tracking Cybersecurity Trends. This time of the year is always exciting for us, as we get to take a step back, analyze how we did throughout the year, and look ahead at what the coming year will bring. Taking full advantage of our team’s expertise in data and application securi...

Read More

How to stay cyber secure over the Christmas period HOW TO STAY CYBER SECURE OVER THE CHRISTMAS PERIOD

blog article

Dec 14, 2018

If there’s a worst possible time for an organisation to suffer a data breach, it’s Christmas. That’s not only because it’s morale-sapping to suffer such bad news at a time that’s supposed to be full of cheer and optimism. There’re also the practicalities of respon...

Read More

The Benefits And Practicalities Of Obfuscation THE BENEFITS AND PRACTICALITIES OF OBFUSCATION

blog article

Dec 14, 2018

Obfuscation is also known as geo-spoofing or anonymization, and it refers to the process of concealing a user’s geographic location. Keeping one’s whereabouts and identity concealed, especially when connecting from untrusted locations, can be challenging. To further complicate matters, i...

Read More

Data Protection in the UK Post-Brexit DATA PROTECTION IN THE UK POST-BREXIT

blog article

Dec 14, 2018

After months of intense negotiations, the UK and the EU have reached a deal for the UK’s exit from the European Union or, as it’s more commonly known, Brexit. However, to gain approval, the 585-page withdrawal agreement must still earn a vote from the British parliament as well as one fr...

Read More

Security Predictions from the Magic 8 Ball SECURITY PREDICTIONS FROM THE MAGIC 8 BALL

blog article

Dec 14, 2018

With the end of each year, security professionals break out their crystal balls to estimate what will be the industry’s trends for the coming year. To break this tradition, I decided to not ask my crystal ball, but my magic 8 ball. This post will cover some of the trends that we can look forwa...

Read More

What Separates Webroot WiFi Security from Other VPNs? WHAT SEPARATES WEBROOT WIFI SECURITY FROM OTHER VPNS?

blog article

Dec 13, 2018

Virtual Private Networks (VPNs) are quickly becoming a fundamental necessity for staying safe online. From large corporations to family households, people are turning to VPNs to ensure their data is encrypted end to end. But as with any emerging technology, it’s easy to become overwhelmed with...

Read More

GSA Simplifies Categories for IT-70 HACS SINs GSA SIMPLIFIES CATEGORIES FOR IT-70 HACS SINS

blog article

Dec 13, 2018

The General Services Administration (GSA) announced changes to the Information Technology Schedule 70 (IT-70) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) on November 14, consolidating its cyber security contract vehicles. The main change is the addition of a new sub-cat...

Read More

Read: New Attack Analytics Dashboard Streamlines Security Investigations READ: NEW ATTACK ANALYTICS DASHBOARD STREAMLINES SECURITY INVESTIGATIONS

blog article

Dec 12, 2018

Attack Analytics, launched this May, aimed to crush the maddening pace of alerts that security teams were receiving. For security analysts unable to triage this avalanche of alerts, Attack Analytics condenses thousands upon thousands of alerts into a handful of relevant, investigable incidents. ...

Read More

How to document your information security policy HOW TO DOCUMENT YOUR INFORMATION SECURITY POLICY

blog article

Dec 12, 2018

Information security policies play a vital role in organisational security. Getting your policy right will give you an excellent framework to build on, making sure that all your efforts follow a single goal. But if you get it wrong, you risk neglecting key issues and exposing yourself to data breach...

Read More

Microsoft Patch Tuesday – December 2018 MICROSOFT PATCH TUESDAY – DECEMBER 2018

blog article

Dec 12, 2018

This month the vendor has patched 39 vulnerabilities, 9 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionali...

Read More

How Cybersecurity Is Evolving: The Real Lesson of Machine Learning HOW CYBERSECURITY IS EVOLVING: THE REAL LESSON OF MACHINE LEARNING

blog article

Dec 11, 2018

Artificial Intelligence (AI) and machine learning are currently hot property, on the wish and hit lists of just about every company on the planet. And it’s not hard to guess why. While AI programs can approximate human behaviour, machine learning (a branch of AI), allows programs to ‘lea...

Read More

2019 will be Privacy Rights’ Break Out Year 2019 WILL BE PRIVACY RIGHTS’ BREAK OUT YEAR

blog article

Dec 11, 2018

Anyone who doubts that 2019 will be the year that the EU’s revolutionary privacy regime, the General Data Protection Regulation (GDPR), finally starts to bite should look to the complaints filed just last week against Google by consumer protection agencies from seven EU countries. The 44 page ...

Read More

Artificial Intelligence and Cybersecurity: Attacking and Defending ARTIFICIAL INTELLIGENCE AND CYBERSECURITY: ATTACKING AND DEFENDING

blog article

Dec 10, 2018

Cybersecurity is a manpower constrained market – therefore, the opportunities for artificial intelligence (AI) automation are vast. Frequently, AI is used to make certain defensive aspects of cyber security more wide reaching and effective. Combating spam and detecting malware are prime exampl...

Read More

Achieve Security Through Compliance in the Cloud ACHIEVE SECURITY THROUGH COMPLIANCE IN THE CLOUD

blog article

Dec 10, 2018

Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy drive, so upon making this great archaeology discovery, I was left simply to ponder about their content and wh...

Read More

What is Bagle Worm? WHAT IS BAGLE WORM?

blog article

Dec 10, 2018

Bagle Worm: Definition. Bagle, also referred to as Beagle, is a mass-mailing computer worm that has affected Microsoft Windows. Bagle refers to a large family of email worms available with many variations. Beagle is notable for the fact that different variants came in password-protected .zip files, ...

Read More

7 Most Common Cybersecurity Mistakes To Avoid 7 MOST COMMON CYBERSECURITY MISTAKES TO AVOID

blog article

Dec 10, 2018

Most website owners pay close attention to various factors affecting their website`s popularity and conversions but leave little to no room for thinking about their cybersecurity. While it may be completely unimportant when you just want to build an audience and drive conversions, what you have to u...

Read More

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack DON’T GET PHISHED – 7 TIPS TO AVOID THIS COMMON CYBER ATTACK

blog article

Dec 06, 2018

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Unfort...

Read More

The Human Factor In Cyber Security – Developers THE HUMAN FACTOR IN CYBER SECURITY – DEVELOPERS

blog article

Dec 06, 2018

About our Cyber Security Series of articles. Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber securi...

Read More

Can Cognitive Tools Succeed Where Humans Have Failed? CAN COGNITIVE TOOLS SUCCEED WHERE HUMANS HAVE FAILED?

blog article

Dec 06, 2018

Security field sees major boon coming thanks to advances in AI, machine learning, and advanced behavioral analytics. Here’s a fact: Current IT protection and prevention don't even come close to addressing all the cyber threats that corporations, governments, and utilities face every single...

Read More

Formjacking: Targeting Popular Stores Near You FORMJACKING: TARGETING POPULAR STORES NEAR YOU

blog article

Dec 05, 2018

Symantec examines the technical aspects of formjacking and details a new campaign affecting top shopping sites. Formjacking, the use of malicious JavaScript code to steal credit card details and other information from payment forms on the checkout web pages of e-commerce sites, has been making headl...

Read More

What Cyberstalking Is and How to Prevent It WHAT CYBERSTALKING IS AND HOW TO PREVENT IT

blog article

Dec 05, 2018

When carried out sensibly and securely, communication through social networks and other online public forums can be beneficial, both socially and professionally. However, if you’re not careful, it can lead to numerous undesirable consequences, one of which is cyberstalking. Cyberstalking is st...

Read More

Open Source Vulnerability Management: Be Wise — Prioritize OPEN SOURCE VULNERABILITY MANAGEMENT: BE WISE — PRIORITIZE

blog article

Dec 05, 2018

It’s safe to say that open source has made it to the big leagues. Across all industries, from healthcare to fintech to IoT and everything in between, software organizations of every size are harnessing the power of open source components to create their innovations. While open source component...

Read More

What is Email Virus and How to Avoid Them? WHAT IS EMAIL VIRUS AND HOW TO AVOID THEM?

blog article

Dec 05, 2018

In general, a computer virus or worm is a self-replicating program capable of being spread by emails or by inserting copies of itself into other documents or programs. Viruses that spread via email are capable of knocking out systems burdened by the huge amounts of generated emails, thus causing sev...

Read More

NRCC Email Hack Highlights Lack of Visibility & Proactive Threat Hunting at Political Organizations NRCC EMAIL HACK HIGHLIGHTS LACK OF VISIBILITY & PROACTIVE THREAT HUNTING AT POLITICAL ORGANIZATIONS

blog article

Dec 05, 2018

Earlier this week, Politico reported that the National Republican Congressional Committee (NRCC) suffered a major attack prior to the 2018 U.S. midterm elections, with thousands of sensitive emails from four senior aides exposed to an outside intruder. While the impact of this breach is still unfold...

Read More

Six ‘Lessons Learned’ For Mitigating DDoS Attacks SIX ‘LESSONS LEARNED’ FOR MITIGATING DDOS ATTACKS

blog article

Dec 05, 2018

The world of DDoS is dynamic and evolving. So, when considering the most important features that a DDoS Mitigation should have, it’s always worth examining them in light of recent trends and applying some lessons learned. That, however, can be a rather time-consuming assignment. But worry not....

Read More

How are your employees using work-issued devices? HOW ARE YOUR EMPLOYEES USING WORK-ISSUED DEVICES?

blog article

Dec 05, 2018

The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Technology found that 75% of employees admitted to shopping during work hours on a company device on Cyber...

Read More

6 Security Tips to Consider While You Travel 6 SECURITY TIPS TO CONSIDER WHILE YOU TRAVEL

blog article

Dec 04, 2018

Following the “8 Ways to Avoid the Cybersecurity Grinch” blog post, it seems like a follow-up is in order given the recent Marriott Breach disclosure.  It is important to note that when we travel, similar to when we shop, we are putting our trust in the organizations we are dealing ...

Read More

CYBER SECURITY – GETTING THE ESSENTIALS IN PLACE CYBER SECURITY – GETTING THE ESSENTIALS IN PLACE

blog article

Dec 04, 2018

Cyber attacks are real. They’re complicated and they’re not going away. In part one of this blog series, we outlined the risks and consequences of cyber crime, and why cyber security is now a whole of business concern. In this post, we’ll delve into how to ensure you’re in th...

Read More

Cybersecurity in Europe is Improving: Thank You GDPR? CYBERSECURITY IN EUROPE IS IMPROVING: THANK YOU GDPR?

blog article

Dec 04, 2018

After years of debate over whether to impose new cybersecurity regulations on companies, General Data Protection Regulation (GDPR) laws went into effect in Europe in May 2018. Already we’ve seen several data breach victims ordered to pay fines under the new rules and cookie disclosure notices ...

Read More

How to Fight Phishing Attacks: Real-World Examples and Solutions HOW TO FIGHT PHISHING ATTACKS: REAL-WORLD EXAMPLES AND SOLUTIONS

blog article

Dec 04, 2018

At Proofpoint, we have seen a rise in highly targeted phishing attacks. 30% of organizations whose O365 environments we've analyzed suffered compromised accounts, mostly via brute force attacks on their O365 credentials. Sometimes these phishing attacks lead to compromised accounts that attacker...

Read More

Fork Bomb Virus FORK BOMB VIRUS

blog article

Dec 04, 2018

Fork bomb is also called wabbit or rabbit virus that was crafted by malicious hackers to launch denial-of-service attack on the target system. The virus replicates itself and corrupts the available system resources. It slows down the performance of the system or sometimes can cause system crashes du...

Read More

Dell detects data breach, informs customers after a month DELL DETECTS DATA BREACH, INFORMS CUSTOMERS AFTER A MONTH

blog article

Dec 04, 2018

It took Dell almost a full month to inform its customers that their information was stolen following a security incident which occurred on November 9, 2018, reads a notice on the computer company’s website. The company reset customer passwords without informing them early on that their data ma...

Read More

2018 Sees API Breaches Surge With No Relief in Sight 2018 SEES API BREACHES SURGE WITH NO RELIEF IN SIGHT

blog article

Dec 04, 2018

Last year the OWASP Top 10 committee was prophetic in at least one of its inclusions in the update to its industry benchmark list. For the first time, the group included insecure APIs as one of the most common attack vectors that developers need to avoid adding to their code when creating software. ...

Read More

AppSec Is Dead, but Software Security Is Alive & Well APPSEC IS DEAD, BUT SOFTWARE SECURITY IS ALIVE & WELL

blog article

Dec 04, 2018

Mobile, cloud, the Internet of Things (IoT), microservices, and artificial intelligence have made software more complex. However, for most organizations the emphasis remains on speed over security, rather than building security into the DevOps process. Traditional security approaches have slowed the...

Read More

3 Trends That Make Automation a Must for Securing Industrial Control Systems 3 TRENDS THAT MAKE AUTOMATION A MUST FOR SECURING INDUSTRIAL CONTROL SYSTEMS

blog article

Dec 03, 2018

Every time I flip a light switch or run water for my daily shower, I’m not thinking of the potential security risks within our power plants or water suppliers. I just take it for granted that the computers working behind the scenes keep things running smoothly. These computers, also known as I...

Read More

Here Are 2018 HERE ARE 2018'S MOST ALARMING SCAM STATISTICS

blog article

Dec 03, 2018

The end of the year is a time when people often engage keep an eye on societal trends. One characteristic to be aware of about 2018 is that it was a year full of scams. Here are six of the most eye-opening and worrisome statistics: 1. Spam Comprised More Than Half of Email Traffic in May 2018. Many ...

Read More

CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem CROWDSTRIKE EXPANDS PUBLIC SECTOR FOOTPRINT AS DLT REINVESTS IN PARTNER ECOSYSTEM

blog article

Dec 03, 2018

In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator: “At DLT, we are doubling down on our key capabilities. DLT has had a partner ecosystem for many years, but we are now reinvesting in that ecos...

Read More

What is Shamoon Virus? WHAT IS SHAMOON VIRUS?

blog article

Dec 03, 2018

Shanmoon was discovered by Seculert, Symantec, and Kaspersky Lab on 16 August 2012 that targets 32-bit NT kernel versions of Microsoft Windows. It is a modular virus and is also known as W32.DisTrack. This virus was crafted for cyber-warfare as it spread the malicious-content from an infected machin...

Read More

Tis the Season to be Phishing TIS THE SEASON TO BE PHISHING

blog article

Dec 03, 2018

The holiday season is upon us once again. The conference call on-hold music has become more cheerful, the annual company party is coming up, and the holiday sales are making their way into circulars, popup ads, and emails. For many of us, these sights and sounds instill a familiar warmth and reminde...

Read More

Is The Supply Chain The New Cyber Abyss? IS THE SUPPLY CHAIN THE NEW CYBER ABYSS?

blog article

Dec 03, 2018

We all know that Target lost its CEO along with $164M dollars when a small HVAC contractor that was part of the supply chain was breached, allowing hackers into Target’s network. However, you may not be aware that banks spent over $200M reissuing Target credit cards. And, what about Chinese te...

Read More

Don’t Let the Grinch Steal Christmas: A Timeline of Holiday Season Magecart Activity DON’T LET THE GRINCH STEAL CHRISTMAS: A TIMELINE OF HOLIDAY SEASON MAGECART ACTIVITY

blog article

Nov 30, 2018

The retail, travel and hospitality industries face difficult security challenges year-round, but November through to the end of the year is the time that keeps the security professionals in these industries especially busy. The holiday shopping season is a time for financially motivated actors to at...

Read More

Red team testing: hacking and lying your way to data RED TEAM TESTING: HACKING AND LYING YOUR WAY TO DATA

blog article

Nov 30, 2018

We at Bulletproof provide a range of different cyber security services, including penetration tests, managed SIEM, and compliance consultancy. Though undoubtedly the most interesting (and cool) service we offer are our red team assessments. So, what is a red team test? Put simply, a red team test is...

Read More

Which Software Offers The Best Virus Protection in 2019? WHICH SOFTWARE OFFERS THE BEST VIRUS PROTECTION IN 2019?

blog article

Nov 30, 2018

Computers today not just need protection from viruses but from the whole lot of malware (spyware, adware etc.,) including the unpredictable zero-day malware. In other words, we are living in an age were virus protection alone is not going to be enough to safeguard your computers. Therefore, let&rsqu...

Read More

What is CryptoWall? WHAT IS CRYPTOWALL?

blog article

Nov 30, 2018

CryptoWall belongs to the ransomware family that uses advanced techniques to infiltrate computers and hides from its victims. Simply put, the Cryptowall is a Trojan horse that encrypts files on the jeopardized computer and then proceeds to threaten the user to pay a ransom to have the files decrypte...

Read More

5 Qualities Your Next Chief Information Security Officer (CISO) Should Have 5 QUALITIES YOUR NEXT CHIEF INFORMATION SECURITY OFFICER (CISO) SHOULD HAVE

blog article

Nov 30, 2018

In a world where dataism has become the new normal for organisations, security has become a high priority. Or at least, it should be a top priority for organisations. Unfortunately, the reality is different, and every year, many consumers still become the victim of one of the hundreds of data breach...

Read More

What makes a strong password? WHAT MAKES A STRONG PASSWORD?

blog article

Nov 30, 2018

Even social media giant Facebook has been ordered to step up data protection as 29 million of its user’s passwords were exposed in 2018. Creating a strong and secure password is a critical step in protecting confidential data and networks. Your infrastructure can come under attack from cyber c...

Read More

8 Ways to Avoid the Cybersecurity Grinch This Holiday Season 8 WAYS TO AVOID THE CYBERSECURITY GRINCH THIS HOLIDAY SEASON

blog article

Nov 29, 2018

According to the Carbon Black Threat Analysis Unit (TAU), organizations should expect to see a spike in potential cyberattacks starting with Black Friday/Cyber Monday and continuing through the holiday shopping season. TAU’s analysis across Carbon Black’s global endpoint footprint &ndash...

Read More

Top 5 Threat Hunting Myths: “EDR Is Threat Hunting” TOP 5 THREAT HUNTING MYTHS: “EDR IS THREAT HUNTING”

blog article

Nov 29, 2018

The cybersecurity landscape is in a constant state of change and, as many organizations have learned, it’s no longer a matter of if you’ll face a cyberattack, but when. In today’s world, attackers intentionally look normal to evade automated defenses. With the rise of ransomware, f...

Read More

Partner Perspectives: Notes from the Field: Extending Carbon Black Visibility to Undetected Malware PARTNER PERSPECTIVES: NOTES FROM THE FIELD: EXTENDING CARBON BLACK VISIBILITY TO UNDETECTED MALWARE

blog article

Nov 29, 2018

Daniel LaVoie is a Senior Solutions Specialist at ReversingLabs. On a recent customer visit, I asked the company’s Director of Security Operations how ReversingLabs came to be deployed as a part of their SOC tool set. The answer was quite interesting, and one that I wanted to share with our bl...

Read More

Phishing Sites Using Lock Symbol to Prove Legitimacy PHISHING SITES USING LOCK SYMBOL TO PROVE LEGITIMACY

blog article

Nov 28, 2018

When accessing a website, the green padlock on the left corner indicates that the connection between the website and user is secure. Security experts have all been recommending that users only access websites where there is a site identity button or a padlock appearing in the address bar. A padlock ...

Read More

Exabeam’s 2019 Cybersecurity Predictions EXABEAM’S 2019 CYBERSECURITY PREDICTIONS

blog article

Nov 28, 2018

When it comes to predicting the future, how do you anticipate the moves of our world’s underground cyber criminals, hackers and rogue nations? While they don’t all agree, Exabeam’s top security sleuths share their predictions for 2019. Tariff, trade, and geopolitical differences wi...

Read More

The Endless Cycle of ERP Securitys THE ENDLESS CYCLE OF ERP SECURITYS

blog article

Nov 28, 2018

In the movie Groundhog Day, Bill Murray’s character begins to go mad from reliving the same day over and over again. For IT teams, this plot can be quite similar to securing ERP systems. Security is a process and securing ERP systems is addressed by people following processes. There is this co...

Read More

The Importance of "S" in "CISO" THE IMPORTANCE OF "S" IN "CISO"

blog article

Nov 28, 2018

A Chief Information Security Officer is the brigadier general of the security force of an organization. While the c-suite normally looks at the financial and overall management of an organization, it is up to the CISO to bring in the security aspect, keeping the organization safe from data breaches ...

Read More

G DATA Techblog: Malware Analysis with a Graph Database G DATA TECHBLOG: MALWARE ANALYSIS WITH A GRAPH DATABASE

blog article

Nov 28, 2018

As an anti-virus vendor, we analyse several hundred thousand of potential malware samples per day. We have to classify these new samples which means first of all that we simply have to decide whether the sample is benign or malicious. In case it is malicious, we want to know whether it belongs to a ...

Read More

Pattern Recognition, Analysis and Profiling for Investigations and Threat Hunting PATTERN RECOGNITION, ANALYSIS AND PROFILING FOR INVESTIGATIONS AND THREAT HUNTING

blog article

Nov 28, 2018

We’ve received a few questions about what we cover in our Pattern Recognition, Analysis and Profiling class. If you are a cyber investigator or analyst – or any role that requires you to extract meaningful information for threat hunting or investigative activities – understanding h...

Read More

Data Privacy In 2019 DATA PRIVACY IN 2019

blog article

Nov 28, 2018

It’s been a big year for data privacy. The world’s strictest data protection standard to date, the European Union’s General Data Protection Regulation (GDPR), became enforceable in May 2018 and its reach stretches far beyond Europe’s borders. GDPR applies to any company that ...

Read More

What’s Next? Webroot’s 2019 Cybersecurity Predictions WHAT’S NEXT? WEBROOT’S 2019 CYBERSECURITY PREDICTIONS

blog article

Nov 27, 2018

At Webroot, we stay ahead of cybersecurity trends in order to keep our customers up-to-date and secure. As the end of the year approaches, our team of experts has gathered their top cybersecurity predictions for 2019. What threats and changes should you brace for? General Data Protection Regulation ...

Read More

What Is Ransomware? Definite Guide WHAT IS RANSOMWARE? DEFINITE GUIDE

blog article

Nov 27, 2018

The 2018 Verizon Data Breach Investigations Report (DBIR) declares ransomware “the most prevalent variety of malware”. Over 181 million ransomware attacks happened in the first six months of 2018. That is a 229 per cent increase in ransomware attacks reported compared to the same period ...

Read More

Vulnerability Assessments Overview: An Essential Component to Your Cyber Security Program VULNERABILITY ASSESSMENTS OVERVIEW: AN ESSENTIAL COMPONENT TO YOUR CYBER SECURITY PROGRAM

blog article

Nov 27, 2018

In this week’s blog we’ll share a vulnerability assessments overview and discuss how they can help you find holes in your security programs before malicious hackers can take advantage of them. Lauren Bellero spoke with Keith Melancon to get his thoughts on this topic. Keith oversees Delt...

Read More

NYDFS Cybersecurity Regulations: A glimpse into the future NYDFS CYBERSECURITY REGULATIONS: A GLIMPSE INTO THE FUTURE

blog article

Nov 27, 2018

The cybersecurity regulation (23 NYCRR 500) adopted by the New York State Department of Financial Services (NYDFS) is nearly two years old. The 2017 bill, the first of its kind, will be fully implemented as of March 1st, 2019. Leading up to that date, companies have had to meet several milestones in...

Read More

What is zero-day exploit WHAT IS ZERO-DAY EXPLOIT

blog article

Nov 27, 2018

A zero-day exploit is a software flaw or a vulnerability. Hackers use this as an exploit to attack the user’s system even before the software vendor identifies it and a security patch fix is available. These zero-day exploits can go unnoticed for a long time and are commonly sold for large sum...

Read More

2018 Cost of Data Breach vs. Cybersecurity Response Plans and Solutions 2018 COST OF DATA BREACH VS. CYBERSECURITY RESPONSE PLANS AND SOLUTIONS

blog article

Nov 27, 2018

Now more than ever, enterprises have an obligation to handle the personal data of their customers. To complete numerous financial transactions or register for various services, people disclose their private information to enterprises with an expectation that they will protect their personal data. Un...

Read More

Sharing Best Practices at Cybersecurity for SAP Customers SHARING BEST PRACTICES AT CYBERSECURITY FOR SAP CUSTOMERS

blog article

Nov 26, 2018

Whether you're just beginning to define the cybersecurity strategy for your SAP infrastructure, or want to brush up on the latest practices, SAPInsider’s Cybersecurity for SAP Customers offers you a chance to network with peers who have similar challenges and meet vendors who hope to contr...

Read More

Cybersecurity and Banking: 3 Trends to Watch in 2019 CYBERSECURITY AND BANKING: 3 TRENDS TO WATCH IN 2019

blog article

Nov 26, 2018

Banks have always been at the forefront of enterprise cybersecurity. Their enormous stores of cash and consumer data have made them a top target for hackers, and the threat of financial losses, regulatory consequences, and reputational damage has spurred them to innovate and accelerate the field of ...

Read More

Petya Ransomware Attack: What is it and How can it be stopped? PETYA RANSOMWARE ATTACK: WHAT IS IT AND HOW CAN IT BE STOPPED?

blog article

Nov 26, 2018

The latest ransomware in the cyberspace called “Petya” is infecting computers around the world at an incredible speed. It uses a vulnerability in the Windows OS that Microsoft patched in March 2017 — notably, it is the same virus that was exploited by the recent and prolific WannaC...

Read More

3 cyber security threats you need to prepare for 3 CYBER SECURITY THREATS YOU NEED TO PREPARE FOR

blog article

Nov 26, 2018

The key to reducing the damage that data breaches can cause is to spot them quickly. Ponemon Institute’s 2018 Cost of a Data Breach Study found that, on average, organisations that identified a breach within 100 days saved more than $1 million (€880,000) per incident. But to be able to sp...

Read More

Symantec Government Symposium Redefines the Cyber Conversation SYMANTEC GOVERNMENT SYMPOSIUM REDEFINES THE CYBER CONVERSATION

blog article

Nov 26, 2018

A renewed push needed for a rethink – and a redefinition – how to approach cyber security One of the long-standing tenants of cyber security is the belief that the attackers have an advantage. That makes sense as cyber security, for the most part, has been a reactionary process that iden...

Read More

Cyber Hygiene: Five Ways to Make Your Bed CYBER HYGIENE: FIVE WAYS TO MAKE YOUR BED

blog article

Nov 26, 2018

“Cyber Hygiene”:  you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security.  Still, others think of “cyber hy...

Read More

VirtualBox Unpatched Zero-Day Vulnerability and Exploit Released Online VIRTUALBOX UNPATCHED ZERO-DAY VULNERABILITY AND EXPLOIT RELEASED ONLINE

blog article

Nov 25, 2018

A Major Oracle VirtualBox Zero-Day vulnerability and exploit were released by a disgruntled security researcher. The vulnerability affects versions of VirtualBox up to 5.2.20. The vulnerability allows a malicious actor with administrator or root access on the guest OS to bypass the guest OS and exec...

Read More

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction? HOW MANY TIMES HAVE YOU COME TO ACCEPT A CERTAIN “TRUTH” THAT EVENTUALLY TURNED OUT TO BE COMPLETE FICTION?

blog article

Nov 23, 2018

From “the world is flat” to “the Earth is the center of the universe” to “the government would never monitor my emails: these mass beliefs in something that were ultimately proven to be a myth was usually to the detriment of those who refused to accept reality over thei...

Read More

Like, share and destroy: How to protect your business from the social media threat LIKE, SHARE AND DESTROY: HOW TO PROTECT YOUR BUSINESS FROM THE SOCIAL MEDIA THREAT

blog article

Nov 22, 2018

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses ...

Read More

What is NotPetya? How to Prevent this Virus from Infecting WHAT IS NOTPETYA? HOW TO PREVENT THIS VIRUS FROM INFECTING

blog article

Nov 22, 2018

NotPetya virus outwardly resembles the Petya ransomware in many ways, however, the fact is that it’s different and a lot more dangerous than Petya. When Petya affected numerous systems even the best antivirus and virus removal programs failed to deduct it. It brought many systems to a grinding...

Read More

Clearswift Wins DLP Award at Computer Security Excellence Awards CLEARSWIFT WINS DLP AWARD AT COMPUTER SECURITY EXCELLENCE AWARDS

blog article

Nov 22, 2018

The Clearswift team is delighted to announce our 2018 Computer Security Excellence Award Win for Data Loss Prevention (email and web).  The awards dinner was held on November 22nd at the London Marriott Hotel in London with our UK team present to accept the award and celebrate our win! Overview...

Read More

Incident Response Plan 101: How to Build One, Templates and Examples INCIDENT RESPONSE PLAN 101: HOW TO BUILD ONE, TEMPLATES AND EXAMPLES

blog article

Nov 21, 2018

What is an Incident Response Plan and Why Do You Need One? An incident response plan helps IT staff identify, respond to and recover from cybersecurity incidents. The objective of an incident response plan is to prevent damages like service outage, data loss or theft, and illicit access to organizat...

Read More

What is a Logic Bomb? WHAT IS A LOGIC BOMB?

blog article

Nov 21, 2018

The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date/time is reached – it triggers the logic bomb malware to start running on a computer. Online fraudsters make use of the ...

Read More

Seven Top Cyber Tactics for Happy Holidays Online SEVEN TOP CYBER TACTICS FOR HAPPY HOLIDAYS ONLINE

blog article

Nov 21, 2018

Tis the season – for dropping your guard. According to Google Trends, online searches on phishing plummet every year over the holiday period. It's natural – after all, you're with your loved ones, you're full of good food, perhaps a little good drink and you're filled wit...

Read More

No organisation is immune to cyber attacks NO ORGANISATION IS IMMUNE TO CYBER ATTACKS

blog article

Nov 20, 2018

Hackers are becoming more skilled and sophisticated, and this is leaving Irish business owners and their systems extremely vulnerable and unable to protect themselves against cyber security threats. One of the most common tools a company can use to defend themselves against hackers is a penetration ...

Read More

The Battle Against Insider Threats and Why You Need Behavior-based Cybersecurity Strategies THE BATTLE AGAINST INSIDER THREATS AND WHY YOU NEED BEHAVIOR-BASED CYBERSECURITY STRATEGIES

blog article

Nov 20, 2018

Insider threats are a growing concern for all organizations—one that is increasingly difficult to manage using conventional security technologies. Unlike other types of security threats, insider threats are complicated by the fact that only some are caused by intentional malicious insiders. &l...

Read More

Lax Employee Cybersecurity Habits Pose Growing Danger to Businesses LAX EMPLOYEE CYBERSECURITY HABITS POSE GROWING DANGER TO BUSINESSES

blog article

Nov 20, 2018

Employees’ cybersecurity habits are bad and getting worse. New research illustrates a workforce less committed to security best practices, despite an increased focus on cybersecurity awareness in the workplace. This years’ Market Pulse Survey by SailPoint Technologies reveals that 75% of...

Read More

Shifting Left in the Cybersecurity Defense Lifecycle SHIFTING LEFT IN THE CYBERSECURITY DEFENSE LIFECYCLE

blog article

Nov 20, 2018

Identifying your risk posture should be the first objective of all cybersecurity programs. Yet, this is where organizations often fail, due to weak visibility and understanding during the crucial “identify” phase of the cybersecurity lifecycle. Focusing on protect, detect, respond, recov...

Read More

Looking Ahead: Cyber Security In 2018 LOOKING AHEAD: CYBER SECURITY IN 2018

blog article

Nov 19, 2018

2017 was a pretty rough year in terms of cybersecurity: ransomware, state-sponsored attacks, phishing scams, and big companies (like Equifax) failing to stick to security best practices (like implementing two-factor authentication) and therefore falling victims to cyber attacks. So what does 2019 ha...

Read More

Seven Major Threat Trends to be watched out in 2018 SEVEN MAJOR THREAT TRENDS TO BE WATCHED OUT IN 2018

blog article

Nov 19, 2018

January 2018 is over, we’re now on to the second month of the new year. Indications are that 2018 would be as eventful as 2017 was, as regards cyber crimes and cyber attacks. The much-evolved versions of the cyber threats that we had witnessed in 2017 would make their appearances in 2018 and p...

Read More

2018: The New Year resolution for Cybersecurity 2018: THE NEW YEAR RESOLUTION FOR CYBERSECURITY

blog article

Nov 19, 2018

Once again, it’s that time of the year, to swear avoiding junk foods, sweets and keep in shape. To learn new arts, and promise yourself with a resolution that this year you are going to pursue your passion and stick on to it. Nevertheless, unlike those personal resolutions, which you already k...

Read More

What’s Going to Happen to the Cryptocurrency Trend in 2018? WHAT’S GOING TO HAPPEN TO THE CRYPTOCURRENCY TREND IN 2018?

blog article

Nov 19, 2018

Bitcoin- the term is familiar now even to the not-so-tech-savvy layman; the internet is so full of success stories of people who have made their fortune by trading in Bitcoin. Rapper 50 Cent (whose real name is Curtis Jackson) had inadvertently made a fortune out of Bitcoin when he allowed his fans ...

Read More

How to Choose the best Antivirus Software of 2019 HOW TO CHOOSE THE BEST ANTIVIRUS SOFTWARE OF 2019

blog article

Nov 19, 2018

Numerous Antivirus software is circulating in the market and ascertaining the best among them is a subject of debate. There are many choices to select from because of a large number of strong rivals plus the reality that today’s best could turn one of tomorrows worst. This particular situation...

Read More

Ransomware Threat Alarmingly High for SMBs as They Place Security on the Back Burner RANSOMWARE THREAT ALARMINGLY HIGH FOR SMBS AS THEY PLACE SECURITY ON THE BACK BURNER

blog article

Nov 19, 2018

Small and medium-sized businesses are still a top target for ransomware attacks, and the number of attacks will most likely increase in 2019, according to a recent survey of MSPs. Over half of MSPs confirmed their clients experienced at least one ransomware attack in the first half of the year, whil...

Read More

How to Promote Cyber Security Inside Your Company HOW TO PROMOTE CYBER SECURITY INSIDE YOUR COMPANY

blog article

Nov 19, 2018

As business are digitizing, companies get more and more vulnerable in front of cyberattacks. The numbers are impressive: in 2025 is expected to be 75 billion connected devices. Considering that more than 300.000 new malware programs are created every day, the risk is real. According to a recent McKi...

Read More

Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader LAZY PASSWORDS BECOME ROCKET FUEL FOR EMOTET SMB SPREADER

blog article

Nov 19, 2018

As featured in the 2018 State of Cybercrime Report released this week by Secureworks®, a small list of cybercrime malware is making the greatest impact in today's threat landscape, including — but not exclusively limited to — malware families like Emotet. Emotet is a modular down...

Read More

What is Backdoor Virus? WHAT IS BACKDOOR VIRUS?

blog article

Nov 17, 2018

A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in the background and hides from the user. It is quite difficult to detect as it is very similar to other malw...

Read More

Cybersecurity Education Series: What Is Malware? CYBERSECURITY EDUCATION SERIES: WHAT IS MALWARE?

blog article

Nov 16, 2018

Malware is one of the most pervasive and dangerous techniques cybercriminals employ to steal an organization’s funds and gain access to confidential data. That’s why were’ dedicating the next post in our cybersecurity education series to reviewing what it is, how it works, and what...

Read More

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud AGENTLESS THREAT DETECTION FOR MICROSOFT AZURE WORKLOADS WITH CISCO STEALTHWATCH CLOUD

blog article

Nov 16, 2018

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad activity. This approach requir...

Read More

Are you aware of the risks associated with the Cloud? ARE YOU AWARE OF THE RISKS ASSOCIATED WITH THE CLOUD?

blog article

Nov 16, 2018

According to the 2018 Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form. However, moving data to the Cloud does not solve security problems – rather, it adds another element that needs addressing. Find out how to tackle this issue with our b...

Read More

CYBER ATTACKS IMPACT DOWNTIME, IOT AND CONTROL SYSTEMS ACCORDING TO NEW DATA CYBER ATTACKS IMPACT DOWNTIME, IOT AND CONTROL SYSTEMS ACCORDING TO NEW DATA

blog article

Nov 16, 2018

Cybersecurity threats can have serious impacts on organizations regardless of industry, and new data highlighted by CSO shows why these disruptions can be dangerous and costly. With 2018 coming to a close, now is as good a time as ever to understand where your cybersecurity vulnerabilities lie, and ...

Read More

Vulnerability scans vs Penetration tests VULNERABILITY SCANS VS PENETRATION TESTS

blog article

Nov 16, 2018

You’ll often find that ‘vulnerability scan’ and ‘penetration test’ are wrongly used interchangeably, creating confusion about which is the right security choice for businesses. Broadly speaking, a vulnerability scan could be thought of as a surface-level security assess...

Read More

Navigation Apps: Leading the Way? Or Following You? NAVIGATION APPS: LEADING THE WAY? OR FOLLOWING YOU?

blog article

Nov 15, 2018

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already built into the car, these navigation tools are taking us to the grocery store, to our grandpare...

Read More

Re-designing Linux Security: Do No Harm – Introduction RE-DESIGNING LINUX SECURITY: DO NO HARM – INTRODUCTION

blog article

Nov 15, 2018

The PSC now supports Linux. Cb Defense, Cb LiveOps & Cb ThreatHunter customers will now have the ability to manage and operate across all major operating systems. Securing your server and your data center workloads has changed significantly in recent years. High performance machines no longer ha...

Read More

Synthetic identity fraud to drive $48 billion in annual losses by 2023 – Juniper Research SYNTHETIC IDENTITY FRAUD TO DRIVE $48 BILLION IN ANNUAL LOSSES BY 2023 – JUNIPER RESEARCH

blog article

Nov 15, 2018

Online payment fraud losses will reach $48 billion annually by 2023, up from the $22 billion in losses projected for 2018, a new study from Juniper Research has found. Juniper’s new research claims that a critical driver behind losses from eCommerce, airline ticketing, money transfer and banki...

Read More

SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS

blog article

Nov 15, 2018

Today’s cyber threats are ever-changing and evolving. Over the last decade, we have seen malware begin to target non-enterprise devices and industrial control systems (ICS) at an alarming pace.  However, most critical infrastructure and ICS asset owners are ill-equipped for this changing ...

Read More

Preparing AV Engines for Fair and Independent Tests PREPARING AV ENGINES FOR FAIR AND INDEPENDENT TESTS

blog article

Nov 15, 2018

How does a cyber-security company prepare its AV engine for fair and independent tests? In our recent blog, we wrote of the importance of independent testing for anti-virus (AV) products, and how organizations such as AV-Comparatives, and AV-Test test as rigorously as possible, in an environment as ...

Read More

Managing critical file transfers MANAGING CRITICAL FILE TRANSFERS

blog article

Nov 15, 2018

While methods for digital collaboration are increasing, such as Instant Messaging, Social Media and a multitude of cloud applications, email remains a universal business communication tool for businesses. For those wanting to collaborate on a sensitive document, there are a variety of cloud-based so...

Read More

See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud SEE BEYOND THE NOISE: HOW NUIX UNCOVERS AND PREVENTS ENTITLEMENT FRAUD

blog article

Nov 14, 2018

Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for...

Read More

FireEye Endpoint Security Achieves Highest Testing Results Amongst NGAV Products FIREEYE ENDPOINT SECURITY ACHIEVES HIGHEST TESTING RESULTS AMONGST NGAV PRODUCTS

blog article

Nov 14, 2018

In the most recent AV-Comparatives Real-World Protection Test results, FireEye Endpoint Security achieved the highest detection rate among next-gen anti-virus vendors with zero false positives. FireEye was able to accomplish this result through a constant flow of innovations that originates with Fir...

Read More

What is Code Red Worm? WHAT IS CODE RED WORM?

blog article

Nov 14, 2018

Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars in the summer of 2001. Marc Maiffret and Ryan Permeh emplo...

Read More

Thinking Global and Acting Local to Close the Skills Gap THINKING GLOBAL AND ACTING LOCAL TO CLOSE THE SKILLS GAP

blog article

Nov 14, 2018

Cybersecurity empowers organizations to enable trust, move faster, add value and grow. In order for cybersecurity to live up to that promise, it will require an increase in talent and new skills to take on the volume and sophistication of today’s threat landscape. According to industry analyst...

Read More

Small Business Benefits of Moving to the Cloud: Resource Friendly SMALL BUSINESS BENEFITS OF MOVING TO THE CLOUD: RESOURCE FRIENDLY

blog article

Nov 14, 2018

Small businesses never seem to have enough people or funding, and the last thing they need is for their security solution to be eating up precious resources. Your people are stretched thin and don’t really have time or budget to source new hardware or push software updates. Not to mention the ...

Read More

What is Polymorphic Virus and how do you deal with it? WHAT IS POLYMORPHIC VIRUS AND HOW DO YOU DEAL WITH IT?

blog article

Nov 13, 2018

Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to another program. Simply put, the computer virus spreads by itself into ot...

Read More

Six Design Considerations for Your Security Data Lake SIX DESIGN CONSIDERATIONS FOR YOUR SECURITY DATA LAKE

blog article

Nov 13, 2018

Large numbers of enterprises, such as retail conglomerates, consumer banks, airlines, and insurance companies are joining the rush to set up data lakes for handling petabytes of security data and logs. But many executives and architects assume that once they finish setting up log sources, applying p...

Read More

SAP Security Notes November ‘18: The Mobile Client Side Menace SAP SECURITY NOTES NOVEMBER ‘18: THE MOBILE CLIENT SIDE MENACE

blog article

Nov 13, 2018

Today SAP released 12 security notes for November’s SAP Security Patch Day as it is scheduled. This makes a total of 16 security notes after adding the four released since October’s patch day. Among these SAP security notes there are three that fix a number of vulnerabilities reported by...

Read More

Small Companies, Big Security Concerns SMALL COMPANIES, BIG SECURITY CONCERNS

blog article

Nov 13, 2018

Many people might tend to associate security breaches and malware attacks with large enterprises. After all, the attacks that grab the big headlines generally occur against global companies or large governmental organizations. That doesn’t by any stretch mean small and mid-sized companies are ...

Read More

Cybersecurity in the workplace CYBERSECURITY IN THE WORKPLACE

blog article

Nov 09, 2018

Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organization. In North America, for example, two top causes of breaches are careless or uninformed employee actions and phishing or other social engineering. Cybercriminals know that, and they use...

Read More

What is the MyDoom Virus? WHAT IS THE MYDOOM VIRUS?

blog article

Nov 09, 2018

The MyDoom virus, also known as Novarg, is another worm capable of developing a backdoor in a victim computer’s operating system. The family of MyDoom e-mail worms continues to be an active threat because of unprotected personal computers and compromised computer systems even though the virus ...

Read More

How Can You Get More from Your AppSec Education Program? HOW CAN YOU GET MORE FROM YOUR APPSEC EDUCATION PROGRAM?

blog article

Nov 09, 2018

Forbes recently published an article titled “The Cybersecurity Talent Gap Is An Industry Crisis” – and without question, there’s a real lack of cybersecurity talent. Cybersecurity Ventures predicts about 3.5 million unfilled cybersecurity job openings by 2021! The need for cy...

Read More

7 Ways to Bridge the Cyber Security Skills Gap 7 WAYS TO BRIDGE THE CYBER SECURITY SKILLS GAP

blog article

Nov 09, 2018

Make security training compulsory and fun with a variety of on-demand media. To scale up cyber security, people who are not part of the security team also need to think and care about it.  This was a key takeaway for scalable cyber security from both the AppSec EU and Black Hat security confere...

Read More

5 Ways To Avoid a Phishing Attack 5 WAYS TO AVOID A PHISHING ATTACK

blog article

Nov 08, 2018

Before diving into the 5 ways to avoid a phishing attack, we want to make sure you understand what phishing means and the risk it presents. Phishing is simply a fraudulent method of obtaining sensitive data by disguising as a trustworthy entity in an email. These attacks usually consist of fake emai...

Read More

Partner Perspectives: Endpoint Phishing Incident Response with Cofense Intelligence and Cb Response PARTNER PERSPECTIVES: ENDPOINT PHISHING INCIDENT RESPONSE WITH COFENSE INTELLIGENCE AND CB RESPONSE

blog article

Nov 08, 2018

Hunting Phished Endpoints with Cofense Intelligence™ and Carbon Black. Ransomware, business email compromise (BEC), malware infections and credential-based theft all primarily stem from a single vector of compromise – phishing. Operationalizing threat intelligence, especially when it com...

Read More

‘Discovering’ Critical Data Stored On The Endpoint ‘DISCOVERING’ CRITICAL DATA STORED ON THE ENDPOINT

blog article

Nov 08, 2018

Ever wondered exactly how much data you have stored on your laptop?  It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from the Intranet, some are from file shares, some are from the cloud, some are… well, they ...

Read More

Security Alert: New Dharma Ransomware Strains Alarmingly Go Undetected By Antivirus Engines SECURITY ALERT: NEW DHARMA RANSOMWARE STRAINS ALARMINGLY GO UNDETECTED BY ANTIVIRUS ENGINES

blog article

Nov 07, 2018

Dharma ransomware is one of the oldest ransomware families in existence and yet it still wreaks havoc, undetected by security solutions. October and November saw the appearance of at least four new strains. We discovered one that goes undetected by almost all the antivirus engines on the market.&nbs...

Read More

Boston Area Business Pays it Forward with a New Boston Tradition BOSTON AREA BUSINESS PAYS IT FORWARD WITH A NEW BOSTON TRADITION

blog article

Nov 07, 2018

We have a lot of long-standing traditions that started in Massachusetts – from Thanksgiving to Patriots Day to the annual Beanpot Tournament, a popular ice hockey competition between four local colleges. As a lifelong Massachusetts resident, I’m one of the 7 million that make the state s...

Read More

CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH

blog article

Nov 07, 2018

There’s never been a more critical time for awareness training for cybersecurity. Attacks of all kinds are on the rise and the ubiquity of technology in the lives of end users can create opportunities for lapses in judgement, human error and avoidable mistakes. As an IT leader in your organiza...

Read More

How to Overcome Common Cybersecurity Project Challenges HOW TO OVERCOME COMMON CYBERSECURITY PROJECT CHALLENGES

blog article

Nov 06, 2018

Are you struggling with managing your cybersecurity projects? Are you facing challenges during your project and don’t know how to deal with them? We’ve put together several common cybersecurity project challenges and propose solutions for what you can do about them. Lack of prioritizatio...

Read More

Free Symantec Service Helps Election Officials and Others Stymie Cyber Attacks FREE SYMANTEC SERVICE HELPS ELECTION OFFICIALS AND OTHERS STYMIE CYBER ATTACKS

blog article

Nov 05, 2018

Business and organizational websites deploying Symantec’s “Project Dolphin” anti-spoof proofing service at no cost. Security, trust and accuracy issues have bedeviled voting and elections from the day after elections moved beyond a simple “can we get a show of hands?” A...

Read More

Clearswift Endpoint Data Loss Prevention CLEARSWIFT ENDPOINT DATA LOSS PREVENTION

blog article

Nov 05, 2018

There are multiple places within your IT infrastructure where critical information is stored. These include email Inboxes, file servers, collaboration servers (some of which might be ‘in the cloud’) and endpoint devices.  All Clearswift solutions are designed to protect critical inf...

Read More

VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY

blog article

Nov 05, 2018

For years, IT security architects trusted perimeter defenses to protect enterprise networks and data. The basic premise was simple: build a rock-solid perimeter to protect the trusted network. Once inside you have far-reaching access to a big flat network. In essence, it was like Jack Byrnes’ ...

Read More

Spoofing: RFID and SMS SPOOFING: RFID AND SMS

blog article

Nov 05, 2018

First, let's start with a definition - What is Spoofing? According to ForcePoint, "Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a com...

Read More

Proofpoint Named a Visionary in the 2018 Gartner Magic Quadrant for Cloud Access Security Brokers PROOFPOINT NAMED A VISIONARY IN THE 2018 GARTNER MAGIC QUADRANT FOR CLOUD ACCESS SECURITY BROKERS

blog article

Nov 05, 2018

Many IT executives have adopted a “Cloud First” strategy to reduce computing costs and improve productivity. However, this boost to operational efficiency is closely followed by the discovery of new security and compliance risks. Security teams are plagued by cloud account compromise. Co...

Read More

What is Locky Ransomware? WHAT IS LOCKY RANSOMWARE?

blog article

Nov 05, 2018

Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word document that runs infectious macros. When the user op...

Read More

What is WannaCry Ransomware? WHAT IS WANNACRY RANSOMWARE?

blog article

Nov 03, 2018

The wannacry ransomware is composed of various components. Files with encryption keys. Application to encrypt data. Application to decrypt data. A copy of Tor Browser. Unlike other ransomware, wannacry has taken the internet world by storm as it created a very bad impact on almost all the business f...

Read More

What Is the Stuxnet Worm Computer Virus? WHAT IS THE STUXNET WORM COMPUTER VIRUS?

blog article

Nov 02, 2018

Stuxnet worm is a rootkit exploit. The Stuxnet worm is targeted at data acquisition (SCADA) systems and supervisory control. On the other side, it is vital to know that the SCADA systems are used for industrial control systems and this includes power, water, sewage plants etc. History of Stuxnet. In...

Read More

What is Zeus Malware? WHAT IS ZEUS MALWARE?

blog article

Nov 01, 2018

The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer are through phishing attacks and drive-by downloads. The Zeus Trojan was first detected when it stol...

Read More

Regulatory Support for Email Security REGULATORY SUPPORT FOR EMAIL SECURITY

blog article

Oct 31, 2018

Email continues to be the most common method used to gain unauthorized access to corporate systems and perpetrate cyber fraud.  More specifically, targeted business email compromise (BEC) attacks clearly stand out as a major problem.  With a recent survey indicating that 89% of organizatio...

Read More

The value of independent anti-virus testing THE VALUE OF INDEPENDENT ANTI-VIRUS TESTING

blog article

Oct 31, 2018

Unlike many other tests in the IT industry, independent anti-virus (AV) testing is really just that: Independent. Their results provide truly useful comparisons between vendors across a range of security software products. This is both for consumers, and for security vendors looking to integrate an ...

Read More

5 Reasons Why U.S. Voting Systems Are Getting Harder to Hack 5 REASONS WHY U.S. VOTING SYSTEMS ARE GETTING HARDER TO HACK

blog article

Oct 31, 2018

Even as the Justice Department stays busy with those suspected of election meddling in the run-up to the midterms, there’s growing reason for optimism about the ability of the US electoral infrastructure to withstand attacks. While it’s still technically possible for a foreign state to a...

Read More

How to Protect Yourself From The Conficker Worm? HOW TO PROTECT YOURSELF FROM THE CONFICKER WORM?

blog article

Oct 30, 2018

A new worm called Conflicker is doing the rounds, attacking unnumbered Windows computers in the recent times. The spread of infection is going from bad to worse and is beyond control as per the reports from a security vendor. Detections of the Conflicker worm are by more than 225% since the end of 2...

Read More

SamSam: Targeted Ransomware Attacks Continue SAMSAM: TARGETED RANSOMWARE ATTACKS CONTINUE

blog article

Oct 30, 2018

Ransomware group remains highly active in 2018, focusing mainly on organizations in the U.S. The group behind the SamSam ransomware (Ransom.SamSam) has continued to mount attacks against entire organizations during 2018, with fresh attacks seen against 67 different targets, mostly located in the U.S...

Read More

Importance of SSL certificate for your company website IMPORTANCE OF SSL CERTIFICATE FOR YOUR COMPANY WEBSITE

blog article

Oct 29, 2018

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL is denoted by two major recognizable features: 1) Website URLs starting ...

Read More

HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES

blog article

Oct 29, 2018

By 2020 there will be 29 billion connected devices, according to ABI Research1, and a growing percentage will be Internet of Things (IoT) devices that are inherently more vulnerable to attacks than traditional computing equipment. The addition of billions of unsecure (and in many cases unsecurable) ...

Read More

Three Key Steps to Help Protect National Infrastructure THREE KEY STEPS TO HELP PROTECT NATIONAL INFRASTRUCTURE

blog article

Oct 26, 2018

A “cyber-Pearl Harbor.” The warning from then Secretary of State Leon Panetta was stark. America was increasingly vulnerable to cyber-attacks from aggressor nation states and extremist groups and the consequences could be disastrous. It's now six years since Panetta issued his cautio...

Read More

What are boot sector viruses and how can I prevent them? WHAT ARE BOOT SECTOR VIRUSES AND HOW CAN I PREVENT THEM?

blog article

Oct 26, 2018

Computer Virus. Even before we try to understand what a boot sector virus is, let us understand what is a computer virus. In the online world, the term computer virus refers to a malicious program that auto-multiplies by copying itself to another program. Simply put, a computer virus spreads itself ...

Read More

How to Prevent Bots from Infecting Your System? HOW TO PREVENT BOTS FROM INFECTING YOUR SYSTEM?

blog article

Oct 25, 2018

What are Bots? Bots are Internet robots also known as crawlers, spiders, and web bots. They are automated programs developed for performing repetitive tasks. With the computing power available to programmers, bots have been developed to execute tasks at extremely high speeds, unbelievable for a real...

Read More

5 Common Visibility Gaps Your Enterprise Security Plan Can’t Afford 5 COMMON VISIBILITY GAPS YOUR ENTERPRISE SECURITY PLAN CAN’T AFFORD

blog article

Oct 25, 2018

Today’s cybersecurity challenges are unlike anything we’ve seen before. Your organization’s IT infrastructures now consist of the traditional network—employee laptops, desktops, various operating software, storage platforms and servers, cloud storage—plus an entirely ne...

Read More

Designing for People: Proofpoint’s UX Team Reveals the Process behind a Product Refresh DESIGNING FOR PEOPLE: PROOFPOINT’S UX TEAM REVEALS THE PROCESS BEHIND A PRODUCT REFRESH

blog article

Oct 25, 2018

Whether it’s stopping attacks that target users or our passion for customer service, protection has always started with people at Proofpoint. People are also the inspiration behind one of the most sweeping UI/UX redesigns in our company’s history. Our UX/UI design team is in the middle o...

Read More

Top 5 trends security teams should begin embracing to manage digital risk TOP 5 TRENDS SECURITY TEAMS SHOULD BEGIN EMBRACING TO MANAGE DIGITAL RISK

blog article

Oct 24, 2018

The digital world has opened up a plethora of opportunities for workplaces across the globe. Digital transformation means, among other things, seamless connectivity, the erasure of physical barriers and enterprises that can leverage the freedom of knowledge sharing without boundaries to enable great...

Read More

BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics BEHAVIOSEC FIRES UP NEXT-GEN CYBERSECURITY SOLUTIONS WITH BEHAVIORAL BIOMETRICS

blog article

Oct 24, 2018

There’s no silver bullet for online security, especially when it comes to user authentication. And enterprises aren’t alone in the struggle to keep up with the needs and demands of authentication. At the center of all of this lies user behavior and the challenge it presents to security. ...

Read More

Cybersecurity tips from the pros CYBERSECURITY TIPS FROM THE PROS

blog article

Oct 23, 2018

Managing customer identities goes well beyond providing great front-end registration, authentication and single sign-on experiences. Janrain clients also know that their customers’ identities are held securely - with Janrain’s Secure Edge restricting external bad actors and our internal ...

Read More

When Ransomware Stopped Working Harder and Started Working Smarter WHEN RANSOMWARE STOPPED WORKING HARDER AND STARTED WORKING SMARTER

blog article

Oct 23, 2018

Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the internet. Back then, criminals would blast phishing emails to millions of email addresses, sending ransomware variants via infected links or Word Documents without any apparent r...

Read More

Protecting Your ERP Applications PROTECTING YOUR ERP APPLICATIONS

blog article

Oct 23, 2018

After spending close to a decade in the world of cybersecurity, it was quite surprising to realize that so many organizations still struggle with properly protecting their ERP applications. Hello Onapsis friends and family! My name is Cindy Valladares and I joined this fantastic company a few months...

Read More

Staying Secure in the Workplace STAYING SECURE IN THE WORKPLACE

blog article

Oct 23, 2018

October is National Cyber Security Awareness Month (NCSAM). Our personal and professional lives are more than ever entwined in technology. Our online awareness and security posture needs solid footing to ensure our cybersecurity knowledge and actions are up to speed.  Security Innovation is pro...

Read More

What is Pharming and How to Prevent These Attacks WHAT IS PHARMING AND HOW TO PREVENT THESE ATTACKS

blog article

Oct 18, 2018

The word Pharming is coined from the words “phishing” and “farming”. It refers to the cybercrime activities such as phishing, where a website’s traffic is hacked in order to steal the sensitive data. Basically, Pharming utilizes the sequence of letters that form an Inte...

Read More

So, You SO, YOU'VE EXPERIENCED A HIPAA BREACH—NOW WHAT?

blog article

Oct 17, 2018

It’s a day every CISO dreads. You think you’ve been doing everything right, but despite your best efforts, you’ve experienced a HIPAA breach, and now the OCR is coming in to perform an investigation. What should you do? First, take a deep breath. Relax. While what you do in the fol...

Read More

10 Tips to Take Control of Your Public Wi-Fi Security 10 TIPS TO TAKE CONTROL OF YOUR PUBLIC WI-FI SECURITY

blog article

Oct 17, 2018

The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions. So whether you are on your way to a vacation in a city that offers public Wi-Fi or you live in a city that is tou...

Read More

CIPHER Named to Top 100 MSSPs of 2018 list as the Top 15 Worldwide CIPHER NAMED TO TOP 100 MSSPS OF 2018 LIST AS THE TOP 15 WORLDWIDE

blog article

Oct 17, 2018

MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that specialize in comprehensive, outsourced cyber security services. The Top 100 MSSP rankings are...

Read More

The 5 most common reasons for implementing ISO 27001 THE 5 MOST COMMON REASONS FOR IMPLEMENTING ISO 27001

blog article

Oct 16, 2018

If you’re considering implementing ISO 27001, the international standard for information security, you’ve probably heard experts like us talk about the benefits. However, it’s always best to find out what organisations with first-hand experience think, which is why we created our I...

Read More

5 Cybersecurity Myths – and Facts 5 CYBERSECURITY MYTHS – AND FACTS

blog article

Oct 16, 2018

Let’s face it: Cybersecurity and identity theft aren’t things we like to think about. And according to recent research, many of us aren’t thinking about it at all. Many of us get an antivirus program, try to use strong passwords, and hope those efforts are enough. But are they? The...

Read More

Cloud Computing and the Shifting Role of Cyber Security CLOUD COMPUTING AND THE SHIFTING ROLE OF CYBER SECURITY

blog article

Oct 15, 2018

As cloud computing changes the government technology landscape, the conversations around security must change as well. It is safe to say that cloud computing and cyber security have been the dominant technology topics in the federal government for the past decade and continue to be today. Look no fu...

Read More

The Risks of Storing Your Passwords in Google Sheets THE RISKS OF STORING YOUR PASSWORDS IN GOOGLE SHEETS

blog article

Oct 12, 2018

Our team loves Google. We use it every day to search, email, store and share documents, and keep our lives (both work and personal) more organized. Honestly, how did we ever function without it? For someone who has no system in place to keep track of their passwords then Google Sheets is a great pla...

Read More

Cybersecurity Education Series: What Is Email Fraud? CYBERSECURITY EDUCATION SERIES: WHAT IS EMAIL FRAUD?

blog article

Oct 12, 2018

Since its inception, email has been a favorite target for cyber criminals hoping to steal sensitive data, user credentials, and company funds. In response, organizations have deployed a wide range of email security tools. But despite increased investment in defense, email fraud is still on the rise....

Read More

What is Crimeware? How to Protect Yourself from Crimeware? WHAT IS CRIMEWARE? HOW TO PROTECT YOURSELF FROM CRIMEWARE?

blog article

Oct 12, 2018

Crimeware is a set of programs or any computer program that has been designed to facilitate illegal activity online. Many spyware programs, keyloggers, and browser hijackers can be considered crimeware, although only those used illicitly. The phishing kit is one common type of crimeware that is a co...

Read More

A Career in Cybersecurity Has Many Positives, But It’s Not Without Challenges A CAREER IN CYBERSECURITY HAS MANY POSITIVES, BUT IT’S NOT WITHOUT CHALLENGES

blog article

Oct 12, 2018

There aren’t many fields where the majority say they’re happy with their profession. A satisfying career path—one where we feel successful—can be a long journey that most of us aren’t taught in school. In fact, 70 percent of workers say they don’t feel satisfied w...

Read More

What is website security? WHAT IS WEBSITE SECURITY?

blog article

Oct 11, 2018

You’ve launched your website and done all you can to ensure its success, but you may have overlooked a critical component: website security. Cyberattacks cause costly clean-up, damage your reputation, and discourage visitors from coming back. Fortunately, you can prevent it all with effective ...

Read More

A new era for customer data – could security be ‘the new green’ for businesses? A NEW ERA FOR CUSTOMER DATA – COULD SECURITY BE ‘THE NEW GREEN’ FOR BUSINESSES?

blog article

Oct 10, 2018

There was a tipping point not so long ago in the realm of environmental responsibility for businesses. For some time, curbing emissions and waste was simply something the corporate world did if it had to, in order to comply with governmental regulations and avoid a hefty fine. Now, driven by a few &...

Read More

Gallmaker: New Attack Group Eschews Malware to Live off the Land GALLMAKER: NEW ATTACK GROUP ESCHEWS MALWARE TO LIVE OFF THE LAND

blog article

Oct 10, 2018

This blog has been updated with a revised list of IoCs. An earlier list of IOCs attached to this blog was generated through an automated system and, due to the dual-use nature of the tools used by the group, erroneously included some low fidelity IoCs. Symantec researchers have uncovered a previousl...

Read More

Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) Awards the Business Email Compromise List with the 2018 JD Falk Award MESSAGING, MALWARE, AND MOBILE ANTI-ABUSE WORKING GROUP (M3AAWG) AWARDS THE BUSINESS EMAIL COMPROMISE LIST WITH THE 2018 JD FALK AWARD

blog article

Oct 09, 2018

Business email compromise (BEC) /email fraud continues to be a serious pain point for organizations worldwide—and according to the FBI, it has resulted in $12.5B in losses. To help combat the issue, a private group of more than 530 organizations/individuals called the Business Email Compromise...

Read More

HHS Urges FDA to Do More on Medical Device Security HHS URGES FDA TO DO MORE ON MEDICAL DEVICE SECURITY

blog article

Oct 08, 2018

We’ve been writing for a few years now about the dangers of connected medical devices and how the U.S. F.D.A. has sought to increase the security of these devices. Previously, in St. Jude Takes Steps to Secure Vulnerable Medical Implants we covered the security surrounding St. Jude medical dev...

Read More

4 Cybersecurity Factors Every Board Member Must Consider for 2019 Planning 4 CYBERSECURITY FACTORS EVERY BOARD MEMBER MUST CONSIDER FOR 2019 PLANNING

blog article

Oct 05, 2018

Cybersecurity is a growing topic of discussion in Board meetings everywhere — given this fact, Board members need to be prepared to speak knowledgeably about their organization’s cybersecurity posture and programs. As businesses near the last quarter of the year and begin their planning ...

Read More

NIST Seeks Public Comment on Managing Internet of Things Cybersecurity and Privacy Risks NIST SEEKS PUBLIC COMMENT ON MANAGING INTERNET OF THINGS CYBERSECURITY AND PRIVACY RISKS

blog article

Oct 04, 2018

The U.S. Department of Commerce’s National Institute of Standards and Technology recently announced that it is seeking public comment on Draft NISTIR 8228, Considerations for Managing Internet of Things (“IoT”) Cybersecurity and Privacy Risks (the “Draft Report”). The d...

Read More

Cybersecurity Starts with Your Employees CYBERSECURITY STARTS WITH YOUR EMPLOYEES

blog article

Oct 04, 2018

We’re all familiar with Smokey the Bear and the “Only You Can Prevent Wildfires” slogan. In 2015, Smokey got an update and the new “Receive a Bear Hug” ads ran nationwide. In the ad, Smokey runs out of the woods and gives a big bearhug to a camper for properly checking ...

Read More

The Massive Data Breach Reducing Dwell Time and the Resulting Damage THE MASSIVE DATA BREACH REDUCING DWELL TIME AND THE RESULTING DAMAGE

blog article

Oct 04, 2018

This week we’ve seen what can happen when a major company like Facebook—or any organization for that matter—is faced with a massive data breach. They face possible loss of intellectual property and brand damage if they expose the privacy of their customers, partners, and workforce....

Read More

Emerging trend of spreading malware through IQY files EMERGING TREND OF SPREADING MALWARE THROUGH IQY FILES

blog article

Oct 03, 2018

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. IQY file is an Excel Web Quer...

Read More

Facebook data breach: what you need to know FACEBOOK DATA BREACH: WHAT YOU NEED TO KNOW

blog article

Oct 03, 2018

On the afternoon of Friday, 28 September, Facebook announced that 50 million Facebook accounts had been breached. What happened? Facebook’s Vice President of Product Management, Guy Rosen, announced that the security breach affected 50 million users. It is believed the attackers exploited a vu...

Read More

4 Emerging Retail Cybersecurity Threats (and How to Stop Them) 4 EMERGING RETAIL CYBERSECURITY THREATS (AND HOW TO STOP THEM)

blog article

Oct 02, 2018

The retail industry has always been a favorite target of cyber criminals. We all remember major data breaches like those that affected Target, TJX, and Home Depot — but the truth is that cybersecurity threats have been a daily concern of retailers for a long time. Point of Sale (POS) system ha...

Read More

What is Browser Hijacking? How to Get Rid of This Virus? WHAT IS BROWSER HIJACKING? HOW TO GET RID OF THIS VIRUS?

blog article

Oct 01, 2018

In computing, a browser hijacking refers to the malicious intrusions made by a hijacker for personal gains. In order to accomplish this, the hijacker uses a malicious software which is placed on the internet browser that alters the activity of the browser. In all the cases, the user is typically una...

Read More

Incident Response Plan: 6 Essential Steps for Responding to a Security Incident INCIDENT RESPONSE PLAN: 6 ESSENTIAL STEPS FOR RESPONDING TO A SECURITY INCIDENT

blog article

Sep 29, 2018

During a cybersecurity incident, security teams will face many unknowns and a frenzy of activity. In such a hectic environment, they may fail to follow proper incident response procedures to effectively limit the damage. This is important because a security incident can be a high-pressure situation,...

Read More

Excerpts from: Using the ATT&CK™ Framework to Mature Your Threat Hunting Program EXCERPTS FROM: USING THE ATT&CK™ FRAMEWORK TO MATURE YOUR THREAT HUNTING PROGRAM

blog article

Sep 28, 2018

Every threat hunt starts with intelligence. As one of the industry’s most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search for threats.  Recently Carbon Black, Red Canary and MITRE teamed up for the webi...

Read More

Apache Struts, RCEs, and the Equifax Breach Anniversary APACHE STRUTS, RCES, AND THE EQUIFAX BREACH ANNIVERSARY

blog article

Sep 27, 2018

We just passed the one-year anniversary of Equifax’s announcement of their massive data breach due to an exploit of an Apache Struts vulnerability (CVE-2017-5638) – and incidentally, at nearly the same time that Apache announced another critical Apache Struts security flaw (). The latest...

Read More

What is Macro Virus and How to Prevent Them WHAT IS MACRO VIRUS AND HOW TO PREVENT THEM

blog article

Sep 27, 2018

What is Macro Virus. A virus that adds its code to the macros associated with spreadsheets, documents, and other data files in a system is called as a macro virus. Any computer infected by macro virus needs an antivirus program to remove it from all its hiding places. A macro virus is designed to ca...

Read More

Quantifying Cybersecurity Risk: A Beginners Guide QUANTIFYING CYBERSECURITY RISK: A BEGINNERS GUIDE

blog article

Sep 27, 2018

For those who have been paying attention, this dramatic upward trend is hardly surprising. Data breaches are getting bigger, more damaging, and more expensive. It’s challenging to read the news without seeing a story about one massive cyber attack or another. In many industries, the fear of cy...

Read More

5 Key Cybersecurity Trends – What I Learned at Exabeam Spotlight 2018 5 KEY CYBERSECURITY TRENDS – WHAT I LEARNED AT EXABEAM SPOTLIGHT 2018

blog article

Sep 26, 2018

Many attendees were quick to say that their organization’s data is increasingly in the cloud. While most talked about their hybrid data center strategy, the emphasis was on moving more IT resources to infrastructure-as-a-service (IaaS) providers like AWS and Azure, as well as deploying softwar...

Read More

Adwind Trojan: How to Stay Safe from Malware ADWIND TROJAN: HOW TO STAY SAFE FROM MALWARE

blog article

Sep 26, 2018

The Adwind Trojan virus, a Remote Access Trojan (RAT), has been noticed to use antivirus software and spreadsheets programs like Excel in order to infect your computer. The virus is back with new tricks trying to bypass your antivirus software in order to infect your computer with dangerous malware....

Read More

The World’s Most Popular Coding Language Happens to be Most Hackers’ Weapon of Choice THE WORLD’S MOST POPULAR CODING LANGUAGE HAPPENS TO BE MOST HACKERS’ WEAPON OF CHOICE

blog article

Sep 26, 2018

Python will soon be the world’s most prevalent coding language. That’s quite a statement, but if you look at its simplicity, flexibility and the relative ease with which folks pick it up, it’s not hard to see why The Economist recently touted it as the soon-to-be most used language...

Read More

Excerpts From “Why Companies Are Replacing AV with Advanced Endpoint Security” EXCERPTS FROM “WHY COMPANIES ARE REPLACING AV WITH ADVANCED ENDPOINT SECURITY”

blog article

Sep 26, 2018

Is legacy antivirus failing to keep your endpoints secure? In Carbon Black’s recent webinar, Fulcanelli Chavez, Sr. Security Operations Analyst at D.A. Davidson, shared how switching from McAfee to Cb Defense has improved protection and simplified operations for his team. Below are excerpts fr...

Read More

What is Trojan Virus? How they work and methods to be protected? WHAT IS TROJAN VIRUS? HOW THEY WORK AND METHODS TO BE PROTECTED?

blog article

Sep 25, 2018

Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim’s system. Most often the users are tricked by means of social engineering that loads and executes the trojans in the background without the users ‘knowledge. Then the ins...

Read More

The Need of Linux Antivirus THE NEED OF LINUX ANTIVIRUS

blog article

Sep 24, 2018

In the IT world, it is generally assumed that Linux is more secure compared to other operating systems. In the recent times, it is noticed that the targeted attacks on Linux based machines are on the rise. No wonder, the Linux platform is now widely used on internal file servers and web servers. Bes...

Read More

How to Protect Your Paycheck: FBI Issues Credential Phishing Alert as Attackers Target Direct Deposits HOW TO PROTECT YOUR PAYCHECK: FBI ISSUES CREDENTIAL PHISHING ALERT AS ATTACKERS TARGET DIRECT DEPOSITS

blog article

Sep 24, 2018

Last week the FBI issued an alert warning organization that cybercriminals are actively using phishing emails to steal consumer log-in credentials for their online payroll accounts. At Proofpoint, we’ve seen this type of attack for a few years now, and unfortunately, all it takes is one creden...

Read More

Know How To Prevent Identity Theft KNOW HOW TO PREVENT IDENTITY THEFT

blog article

Sep 21, 2018

Today the increasing number of cyber attacks are targeted on individuals and small size businesses. The attacks are aimed at robbing an individual’s identity which is referred to as the identity theft. Thus, a stolen information, such as driving license detail or social security number or othe...

Read More

How to Stop Cyberattacks on Your IoT Infrastructure HOW TO STOP CYBERATTACKS ON YOUR IOT INFRASTRUCTURE

blog article

Sep 21, 2018

In part one of our internet of things (IoT) blog series, we provided background on the tremendous growth of IoT and their innovative use cases—from alarm systems, to power grid monitoring, to devices that are combating honeybee colony collapse disorder. We also looked at the 600% increase in I...

Read More

How Do I Know If My Android Phone/Device Has Virus? HOW DO I KNOW IF MY ANDROID PHONE/DEVICE HAS VIRUS?

blog article

Sep 20, 2018

Cybercrime is at an all-time high. Criminals are not only targeting home users; they are also preying on businesses jeopardizing their websites and acquiring sensitive clientele information. How to know if your Android phone/device has a virus? Are you a potential victim of an online scam? How to pr...

Read More

Security Leadership Series: An Important Principle for Every Cybersecurity Leader to Remember SECURITY LEADERSHIP SERIES: AN IMPORTANT PRINCIPLE FOR EVERY CYBERSECURITY LEADER TO REMEMBER

blog article

Sep 20, 2018

Here’s a principle every cybersecurity leader needs to acknowledge: Cybersecurity is not the single most important element of your company’s business. In reality, most businesses exist to make money or return some form of value to their stakeholders (unless you’re a nonprofit, in w...

Read More

Microsoft Windows Server 2016 Security MICROSOFT WINDOWS SERVER 2016 SECURITY

blog article

Sep 20, 2018

You may have been following our series of blog posts on Microsoft Windows Server security features and capabilities for reducing risk in your IT infrastructure. Today, we’ve compiled a list of all these blog posts. You can use them in two ways as you work to secure your Windows Server operatin...

Read More

Increased Use of a Delphi Packer to Evade Malware Classification INCREASED USE OF A DELPHI PACKER TO EVADE MALWARE CLASSIFICATION

blog article

Sep 20, 2018

The concept of "packing" or "crypting" a malicious program is widely popular among threat actors looking to bypass or defeat analysis by static and dynamic analysis tools. Evasion of classification and detection is an arms race in which new techniques are traded and used in the w...

Read More

Does Windows 10 Need Antivirus? DOES WINDOWS 10 NEED ANTIVIRUS?

blog article

Sep 19, 2018

In today’s digital world, malware and cyber attacks have become ubiquitous. Gone are the days when there was only a handful of malicious programs such as viruses. Nowadays, new and powerful malware variants such as the ransomware, spyware, keyloggers, and various new forms of malware have beco...

Read More

New Zero-Day Vulnerability Attack in Windows NEW ZERO-DAY VULNERABILITY ATTACK IN WINDOWS

blog article

Sep 18, 2018

A zero-day also known as Day Zero or 0-day refers to the computing vulnerability which is often sought by the hackers to exploit for selfish and illegal reasons. Zero Day Vulnerability Attacks are becoming more and more common these days. Recently, another one was discovered in Windows and it was im...

Read More

Data Security: When did you last check your printers? DATA SECURITY: WHEN DID YOU LAST CHECK YOUR PRINTERS?

blog article

Sep 14, 2018

Most enterprises have suffered at least one data breach through their printers. Meanwhile, researchers have recently highlighted the fact that many 3D printers are routinely being exposed online without any adequate access controls. Here’s the problem: too many of us overlook printers as dumb ...

Read More

Guide To Survival The Data Breach GUIDE TO SURVIVAL THE DATA BREACH

blog article

Sep 13, 2018

Many of us might have fallen a prey to cyber criminals at least once in the last few years and suffered a bit due to data breach issues. In all cases, a cybercriminal uses malware to infiltrate the systems to cull out the required data, but if an antivirus software is installed then it can prevent s...

Read More

Battling Cyber Threats Using Next-Gen SIEM and Threat Intelligence BATTLING CYBER THREATS USING NEXT-GEN SIEM AND THREAT INTELLIGENCE

blog article

Sep 12, 2018

While SIEMs are central for SOC cybersecurity—collecting logs and data from multiple network sources for evaluation, analysis, and correlation of network events for threat detection—SIEMs are often not enough. With the growing sophistication of organized, modern cyber attackers and their...

Read More

How The ATT&CK™ Framework Can Mature Your Threat Hunting Program HOW THE ATT&CK™ FRAMEWORK CAN MATURE YOUR THREAT HUNTING PROGRAM

blog article

Sep 11, 2018

The truth about threat hunting is that it’s a process that matures with your security team.  The more you learn more about the threat landscape, the more you can operationalize that knowledge.  Because of this, it is important to work within a framework that can help you track the gr...

Read More

Getting Better Together in Cybersecurity GETTING BETTER TOGETHER IN CYBERSECURITY

blog article

Sep 06, 2018

“Determining Evil from Benign in the Normally Abnormal World of InfoSec” We cannot control our adversary. Although we can choose to control them once in our environment. We have little to no control over when the “big attack” happens. For too long I think we have focused so h...

Read More

Cybersecurity, Information Security, Network Security, Information Assurance: What’s the Difference? CYBERSECURITY, INFORMATION SECURITY, NETWORK SECURITY, INFORMATION ASSURANCE: WHAT’S THE DIFFERENCE?

blog article

Sep 06, 2018

As hackers, security breaches and malware attacks continue to dominate headlines, cyber crime has emerged as a global “pandemic” that last year cost people and organizations an estimated $600 billion, according to CNBC. So it’s not surprising that combating such activities has beco...

Read More

Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware FALLOUT EXPLOIT KIT USED IN MALVERTISING CAMPAIGN TO DELIVER GANDCRAB RANSOMWARE

blog article

Sep 06, 2018

Towards the end of August 2018, FireEye identified a new exploit kit (EK) that was being served up as part of a malvertising campaign affecting users in Japan, Korea, the Middle East, Southern Europe, and other countries in the Asia Pacific region. The first instance of the campaign was observed on ...

Read More

US users worry about identity theft, data leaks but still click on malicious links, use weak passwords, Bitdefender finds US USERS WORRY ABOUT IDENTITY THEFT, DATA LEAKS BUT STILL CLICK ON MALICIOUS LINKS, USE WEAK PASSWORDS, BITDEFENDER FINDS

blog article

Sep 05, 2018

By now, we have all acknowledged the benefits the Internet of Things has to offer not only to the daily lives of consumers, but also to city infrastructures, governments and enterprises. But how security-aware are consumers? According to a Bitdefender survey, the average US home has about 11 smart d...

Read More

New CLEAR Solution: Automation from Email Reporting through Remediation NEW CLEAR SOLUTION: AUTOMATION FROM EMAIL REPORTING THROUGH REMEDIATION

blog article

Sep 04, 2018

We’re excited to announce, thanks to Proofpoint’s recent acquisition of Wombat, the availability of the Closed-Loop Email Analysis and Response (CLEAR) solution, our industry’s first complete closed-loop approach to instant end-user email reporting, analysis, and remediation. This ...

Read More

37% of IT Managers See Failure to Install Updates as the Biggest Security Threat of 2018 37% OF IT MANAGERS SEE FAILURE TO INSTALL UPDATES AS THE BIGGEST SECURITY THREAT OF 2018

blog article

Aug 31, 2018

Outdated software is now a bigger threat than weak passwords, bring-your-own-device (BYOD) and unsecured USB sticks, according to a new study. 27% of enterprises spend, on average, at least a month before installing vital security patches, data shows. Among businesses with over 100,000 computer term...

Read More

Do You Know How Computer Virus Spreads? DO YOU KNOW HOW COMPUTER VIRUS SPREADS?

blog article

Aug 31, 2018

More and more people are falling a prey to the cyber attacks and losing the valuable data to an unrecognizable online fraudster is becoming one of the biggest nightmares. Say for example, the important analysis report that you prepared the previous night for your company’s new project is all g...

Read More

Cyber Espionage and the US Elections: What are Russian Hackers Possibly Doing and How Can They be Stopped? CYBER ESPIONAGE AND THE US ELECTIONS: WHAT ARE RUSSIAN HACKERS POSSIBLY DOING AND HOW CAN THEY BE STOPPED?

blog article

Aug 31, 2018

Russian meddling in the 2016 US elections and the Hillary Clinton campaign email breach came as a surprise to many (with investigations underway as to who knew what and who was involved). While the New York Times reported the Obama White House had warned the Russians about “malicious cyber act...

Read More

AI and Cybersecurity: combining data with human expertise AI AND CYBERSECURITY: COMBINING DATA WITH HUMAN EXPERTISE

blog article

Aug 30, 2018

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and A...

Read More

4 Reasons Why All Businesses Need a Password Manager 4 REASONS WHY ALL BUSINESSES NEED A PASSWORD MANAGER

blog article

Aug 30, 2018

Today, doing business means having dozens of online accounts and dozens (or even hundreds) of passwords. Technology helps us run our businesses more effectively, but it can also make us more vulnerable to data breaches and cyber attacks. Jungle Disk’s suite of cybersecurity products and servic...

Read More

Is Your Small Business at Risk of a Cyber Attack? IS YOUR SMALL BUSINESS AT RISK OF A CYBER ATTACK?

blog article

Aug 29, 2018

After reading an article in Dark Reading, I was shocked to find out that over fifty percent of small to medium sized businesses (SMB) do not think they are at risk of cyber attacks. On top of that, I found it interesting that seventy-six percent of SMBs were not using multi-factor authentication eit...

Read More

An Introduction to AWS Cloud Security AN INTRODUCTION TO AWS CLOUD SECURITY

blog article

Aug 28, 2018

AWS is an indispensable part of business strategy for companies worldwide that make use of its infrastructure, platform, and software services. For example, giant pharmaceuticals slice into the time it takes to complete clinical trials on billion-dollar drugs by spinning up instance after instance o...

Read More

Be aware Hiddad Malware present on Google Play Store BE AWARE HIDDAD MALWARE PRESENT ON GOOGLE PLAY STORE

blog article

Aug 27, 2018

Quick Heal Security Lab has spotted a couple of applications on play store which hide themselves after installation and display full screen ads after specific time interval. This trend is used by most of the developers these days to earn profit by displaying ads. Even if users want to uninstall thes...

Read More

Four Fundamentals in Building a Security Stack FOUR FUNDAMENTALS IN BUILDING A SECURITY STACK

blog article

Aug 27, 2018

Cybersecurity is an enormous investment with even more enormous consequences for mistakes. To build an optimal security stack you need to balance residual risks with total cost of ownership of the cyber security stack and with minimal disruption to operations. Unfortunately , we have reached an impa...

Read More

Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities FORESHADOW ATTACKS ON INTEL CHIPS IS CAUSING SERIOUS VULNERABILITIES

blog article

Aug 25, 2018

Intel’s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if malware or another malady compromises the main computer. A global research group comprising of researche...

Read More

New Wi-Fi attack can crack your passwords NEW WI-FI ATTACK CAN CRACK YOUR PASSWORDS

blog article

Aug 24, 2018

Did you know that there exists a simple way to crack passwords from routers with WPA2 security? Fortunately, this hidden truth was uncovered by the white hat hackers recently! Everybody is using Wi-Fi network these days, and the usual protocols to count on are WPA or WPA2. In simple words, the Wi-Fi...

Read More

10 Best Practices for Creating an Effective Computer Security Incident Response Team (CSIRT) 10 BEST PRACTICES FOR CREATING AN EFFECTIVE COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

blog article

Aug 24, 2018

In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. Unlike a security operations center (SOC) —a dedicated group with the tools to defend networks, servers, and other IT i...

Read More

Guide to Securing Your Mobile App against Cyber Attacks GUIDE TO SECURING YOUR MOBILE APP AGAINST CYBER ATTACKS

blog article

Aug 23, 2018

Thanks to the advent of technology, the number of mobile phone users are increasing day by day. You’ll be shocked to hear that by 2019, this number will cross the 5 billion mark! While mobile phones may have made our life easier, they have also opened up domains for many cybercriminals who are...

Read More

Unencrypted laptop exposes personal details of 37,000 Eir customers, faulty security update blamed UNENCRYPTED LAPTOP EXPOSES PERSONAL DETAILS OF 37,000 EIR CUSTOMERS, FAULTY SECURITY UPDATE BLAMED

blog article

Aug 23, 2018

It’s not great when any organisation loses a laptop, but if the contents of the computer’s hard drive have been fully encrypted and a strong password has been used it’s hardly the end of the world. After all, the chances of a criminal being able to access any sensitive information ...

Read More

What is Ransomware? WHAT IS RANSOMWARE?

blog article

Aug 22, 2018

Ransomware is a malicious software which is also known as ransom-malware that threatens to delete or deny access to data, once it takes control over a computing device. The cybercriminal who initiated the attack commands ransom to be paid through cryptocurrency or credit card in order to recover the...

Read More

Three of the Latest Email Security Threats Facing Your Organization THREE OF THE LATEST EMAIL SECURITY THREATS FACING YOUR ORGANIZATION

blog article

Aug 22, 2018

Email is a top vector for cybercriminals to breach your organization. In fact, email-borne attacks are responsible for more than 93% of breaches, according to Verizon's Data Breach Investigation Report. Before you can properly defend against such threats you need to understand their nature. Here...

Read More

Email Fraud Continues to Rise as the Number of Attacks Grew 36% in Q2 EMAIL FRAUD CONTINUES TO RISE AS THE NUMBER OF ATTACKS GREW 36% IN Q2

blog article

Aug 21, 2018

Email fraud continues to make headlines within the cybersecurity space and continuously reaches unprecedented levels of impact on organizations of all sizes and in all locations. In fact, the FBI recently released a new report indicating that business email compromise (BEC) and email account comprom...

Read More

What You Need to Know About Ransomware WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

blog article

Aug 21, 2018

2017 was dominated by major ransomware attacks, a relatively new cyber threat which holds data captive until a ransom is paid. Last year’s WannaCry attack famously impacted more than 200,000 computers across the globe, with victims spanning across various industries. Just this past week, the c...

Read More

What is Adware and How to Get Rid of it WHAT IS ADWARE AND HOW TO GET RID OF IT

blog article

Aug 20, 2018

Adware is any software application that shows unwanted ads while a program is running. Most adware arrives embedded inside a free software supported by advertisements that show up in pop-up windows or on a toolbar on a computer or browser. Some of them are safe yet annoying. The dark ones focus on s...

Read More

What is Melissa Virus? How to Stay Protected from them WHAT IS MELISSA VIRUS? HOW TO STAY PROTECTED FROM THEM

blog article

Aug 19, 2018

Melissa is a macro virus that was wide-spread through a suspicious e-mail attachment in 1999. It was initially sent as a Microsoft Word file, which when clicked to open, emailed the malicious content to another 50 contacts of the victim’s address book. It does not infect any of the files or an...

Read More

Tips to Avoid Phishing Attacks TIPS TO AVOID PHISHING ATTACKS

blog article

Aug 17, 2018

In an organization, Employees play a vital role in information security. Thus it is critical for organizations to educate employees about safe computing habits in addition to having the right security tools (such as antivirus software or virus protection software) in place. Employees hold the necess...

Read More

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package ANDROID MALWARE THAT COMBINES A BANKING TROJAN, KEYLOGGER, AND RANSOMWARE IN ONE PACKAGE

blog article

Aug 17, 2018

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibil...

Read More

Password Security : The Good, the Bad, and the “Never Should Have Happened” PASSWORD SECURITY : THE GOOD, THE BAD, AND THE “NEVER SHOULD HAVE HAPPENED”

blog article

Aug 16, 2018

While most organizations have a password policy that sounds technically secure, hardly any have a policy that benefits the organization, encourages strong passwords, and improves overall security. It’s time to stop requiring capital letters, numbers, special characters, and frequent password u...

Read More

Computer Hacking – What are they and how to stay protected? COMPUTER HACKING – WHAT ARE THEY AND HOW TO STAY PROTECTED?

blog article

Aug 16, 2018

Individuals using a computer connected to the Internet are susceptible to the threats that online predators and computer hackers pose. These computer hacking experts generally use phishing scams, instant messages or spam email and bogus websites in order to deliver dangerous malware to your computer...

Read More

Q1 2018 DDOS TRENDS REPORT: 58 PERCENT OF ATTACKS EMPLOYED MULTIPLE ATTACK TYPES Q1 2018 DDOS TRENDS REPORT: 58 PERCENT OF ATTACKS EMPLOYED MULTIPLE ATTACK TYPES

blog article

Aug 16, 2018

Verisign just released its Q1 2018 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of Verisign DDoS Protection Services, and security r...

Read More

Using Modern Threat Hunting for a More Effective Investigation of Cyber Threats USING MODERN THREAT HUNTING FOR A MORE EFFECTIVE INVESTIGATION OF CYBER THREATS

blog article

Aug 16, 2018

Until recently, most security operations centers (SOC) were dependent on their analysts’ skill level and relied on manual steps to detect the cyber threats to their organization. This typically required examining known indicators of compromise (IOC)—one painful threat at a time. When a s...

Read More

Global Cyber Security spending to top $114bn in 2018, says Gartner GLOBAL CYBER SECURITY SPENDING TO TOP $114BN IN 2018, SAYS GARTNER

blog article

Aug 16, 2018

The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner reveals. Gartner forecasts that worldwide spending on information security products and services will exceed $114...

Read More

The Key to EDR You Didn’t Know You Were Missing THE KEY TO EDR YOU DIDN’T KNOW YOU WERE MISSING

blog article

Aug 15, 2018

It’s no longer enough for companies to simply “keep up” in the world of cybersecurity. To prevent attackers from infiltrating your systems, you need to be one step ahead at all times. It’s no wonder, then, that the majority of companies are spending more on cybersecurity than...

Read More

Best Security Solution for Small Business BEST SECURITY SOLUTION FOR SMALL BUSINESS

blog article

Aug 14, 2018

Gain deeper insights into world-class network security for small enterprises/businesses like yours, the information technology protection for small businesses has become more complex with loads of online threats appearing daily! Similar to the giants in the space, the small ones too suffer from grav...

Read More

What does cyber insurance cover and is it worth the investment? WHAT DOES CYBER INSURANCE COVER AND IS IT WORTH THE INVESTMENT?

blog article

Aug 14, 2018

Sales of cyber insurance policies are increasing and have been steadily doing so over the past few years. There are now numerous specialist cyber insurance policies designed to cover the various aspects of a cyber-attack or incident, but are they worth it? This blog will explore the pros and cons of...

Read More

What is the ILOVEYOU Virus? How it Infects and Methods to Remove them WHAT IS THE ILOVEYOU VIRUS? HOW IT INFECTS AND METHODS TO REMOVE THEM

blog article

Aug 13, 2018

In the third month of the year 1999, the Melissa virus was circulated in the online space as an e-mail attachment. This fast-spreading macro virus when opened disabled a number of security features in Word 97 or Word 2000. In the case of users who had the MS Outlook e-mail program, aided the virus t...

Read More

SharpShooter Pen Testing Framework Used by Attackers SHARPSHOOTER PEN TESTING FRAMEWORK USED BY ATTACKERS

blog article

Aug 12, 2018

Fileless malware is a type of a malicious code execution technique that operates completely within process memory; no files are dropped onto the disk. Without any artifacts on the hard drive to detect, these attacks easily evade most security solutions. In this post, we take a look at SharpShooter, ...

Read More

What Now? How to Execute the Cybersecurity Plan You Have in Place WHAT NOW? HOW TO EXECUTE THE CYBERSECURITY PLAN YOU HAVE IN PLACE

blog article

Aug 09, 2018

CISOs and other security leaders are tasked with protecting their organizations from cyber attacks. That means developing and implementing the policies, controls, and procedures that reduce risk and ensure the safety of sensitive data. It also means keeping the cybersecurity program alive and well-f...

Read More

How to Check if an Android App is Safe to Install HOW TO CHECK IF AN ANDROID APP IS SAFE TO INSTALL

blog article

Aug 09, 2018

If you are an Android user, you might have come across or heard of Android malware. Nowadays, the media is also full of reports about Android malware infecting unwary Android users. Does this mean you should install an antivirus on your smartphone? Which is the best antivirus or malware removal tool...

Read More

At $17 million, Atlanta network recovery six times more expensive than estimated AT $17 MILLION, ATLANTA NETWORK RECOVERY SIX TIMES MORE EXPENSIVE THAN ESTIMATED

blog article

Aug 08, 2018

The SamSam ransomware attack on the city of Atlanta in March is probably one of the most expensive security incidents, with the recovery cost adding up to some $17 million of taxpayers’ money, according to a seven-page “confidential and privileged” report accessed by The Atlanta Co...

Read More

Why Personal Webmail and Browsing Is a Big Risk for Your Corporate Network WHY PERSONAL WEBMAIL AND BROWSING IS A BIG RISK FOR YOUR CORPORATE NETWORK

blog article

Aug 08, 2018

For many organizations, corporate email is their number one threat vector, as they continue to deal with a seemingly never-ending stream of targeted malicious attachments and URLs. Email is so well suited to attacks that personal webmail, and personal browsing more generally, is now joining corporat...

Read More

Know about the top 10 Android Hacking apps KNOW ABOUT THE TOP 10 ANDROID HACKING APPS

blog article

Aug 06, 2018

Android smartphones are now the most sought-after mobile phones due to its versatility, affordability, and user-friendliness. With the rise in the number of users hackers find them a rich source of a target and install Android hacking apps on both non-rooted and rooted devices as well. In this artic...

Read More

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head TANIUM VERSUS TACHYON: THE BIG BEASTS OF THE ENDPOINT DETECTION AND REMEDIATION JUNGLE GO HEAD-TO-HEAD

blog article

Aug 06, 2018

Prevention trumping cure is a such a well-polished truism it can be slightly jarring to learn that the emphasis has lately been undergoing a reversal in the realm of cybersecurity – with “cure” (or, “remediation”) taking growing precedence. Whereas previously organizati...

Read More

Emotet banking malware attacks government and public sectors EMOTET BANKING MALWARE ATTACKS GOVERNMENT AND PUBLIC SECTORS

blog article

Aug 05, 2018

Emotet is a new banking trojan. It is a downloader that functions to download other trojans into the system or a network. It is the most expensive and destructive malware affecting state, tribal, local, and territorial governments, and even creating impact against the public and private sectors. The...

Read More

11 Best Internet Safety Tips for Everyday Online Users 11 BEST INTERNET SAFETY TIPS FOR EVERYDAY ONLINE USERS

blog article

Aug 04, 2018

The online transactions have seen a surge in the recent years. More and more businesses have tried to get benefited by going online to sell their products and services. But this has also opened the door to online fraudsters who regularly look for unprotected websites to make their intrusion attempts...

Read More

BGP/DNS Hijacks Target Payment Systems BGP/DNS HIJACKS TARGET PAYMENT SYSTEMS

blog article

Aug 03, 2018

In April 2018, we detailed a brazen BGP hijack of Amazon’s authoritative DNS service in order to redirect users of a crypto currency wallet service to a fraudulent website ready to steal their money. In the past month, we have observed additional BGP hijacks of authoritative DNS servers with a...

Read More

A Look at Scan4You and the Counter Antivirus Service Landscape A LOOK AT SCAN4YOU AND THE COUNTER ANTIVIRUS SERVICE LANDSCAPE

blog article

Aug 02, 2018

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker a...

Read More

Using Deep Learning to Reduce the Security Risks of Unmanaged Devices USING DEEP LEARNING TO REDUCE THE SECURITY RISKS OF UNMANAGED DEVICES

blog article

Aug 02, 2018

Whether it’s an employee’s cell phone, a contractor’s iPad, or a virtual machine (VM) created by a compromised account for malicious purposes, any unmanaged device on your network should be considered a security risk. Whether legitimate, or unauthorized, or rogue, such unmanaged de...

Read More

5 Tips for Ultimate Online Security and Privacy 5 TIPS FOR ULTIMATE ONLINE SECURITY AND PRIVACY

blog article

Aug 01, 2018

Unless you are living under a rock, you would have undoubtedly heard a lot about malware and cyber-attacks that plague the internet users across the globe. Here are some of the best practices to prevent malware/cyber-attacks and secure your online privacy. Also, we will discuss the importance of ant...

Read More

Spam Remains the Criminals SPAM REMAINS THE CRIMINALS' FAVORITE ONLINE TOOL

blog article

Aug 01, 2018

Spam is forty years old, and it's still the enduring favorite of cyber criminals. What's reckoned to have been the first spam was distributed in 1978 over ARPANET. ARPANET would evolve into what we now recognize as the Internet. That email was a relatively benign marketing message, but spam ...

Read More

To Reward, or Not to Reward TO REWARD, OR NOT TO REWARD

blog article

Aug 01, 2018

In late 2014, in the aftermath of the Sony Pictures Entertainment breach, I had advocated the development of a cyber breach reporting portal where individuals could report suspected cyber incidents. Such a system, I argued, would work as an early warning system so IT could be made aware of an attack...

Read More

Trojan Virus- Their Types and Methods to Remove Them TROJAN VIRUS- THEIR TYPES AND METHODS TO REMOVE THEM

blog article

Jul 31, 2018

A Trojan horse is a particular type of malware that is mostly disguised as authorized software. Trojans can be used by hackers and cyber-thieves trying to gain access to a user’s system. This takes place by tricking users with some form of social engineering into loading and then executing Tro...

Read More

Which Cybersecurity Tasks Should I Prioritize First? Tips from the Experts WHICH CYBERSECURITY TASKS SHOULD I PRIORITIZE FIRST? TIPS FROM THE EXPERTS

blog article

Jul 30, 2018

Cybersecurity is a multifaceted topic with many constantly evolving variables. For CISOs and other security leaders, just knowing where to begin can be a challenge. Let’s say you’ve just taken over an organization’s cybersecurity program, or have been tasked with building one from ...

Read More

Types of Computer Virus and How to Remove Them? TYPES OF COMPUTER VIRUS AND HOW TO REMOVE THEM?

blog article

Jul 28, 2018

Computer viruses come in many forms, it is important to know what you are dealing with. However, even before we get started with knowing the types of viruses, it is ideal to comprehend the computer virus definition. Types of Computer Virus. Boot Sector Virus. Web Scripting Virus. Browser Hijacker. R...

Read More

Malware vs Viruses: What’s the Difference? MALWARE VS VIRUSES: WHAT’S THE DIFFERENCE?

blog article

Jul 27, 2018

Understanding the difference between malware and viruses is very important. A virus is just one type of malware, but the term is more widely used by the public. The term malware refers to any malicious software, including a computer virus. For example, between 2000 and 2005, spyware and adware emerg...

Read More

Which specific malware trends should American businesses be prepared for? WHICH SPECIFIC MALWARE TRENDS SHOULD AMERICAN BUSINESSES BE PREPARED FOR?

blog article

Jul 27, 2018

In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and...

Read More

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence OUR EXTENSIVE SURVEY ON IOT CYBERSECURITY HAS REMARKABLE TOP CONSEQUENCE

blog article

Jul 26, 2018

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physica...

Read More

How to Get Rid of Malware? HOW TO GET RID OF MALWARE?

blog article

Jul 26, 2018

Malware: Meaning. Malware refers to a program or code designed to execute something harmful to your computer or your private information. When compared to the old viruses that would just shut your system down, malware tries its very best to go unnoticed as long as possible by smartly hiding througho...

Read More

Partner Perspectives: The Target Strikes Back – Predicting the Persistent Attacker PARTNER PERSPECTIVES: THE TARGET STRIKES BACK – PREDICTING THE PERSISTENT ATTACKER

blog article

Jul 26, 2018

Predicting cyber-attacks has long been an elusive goal in the cyber-security industry. Methods such as Lockheed Martin’s Cyber Kill Chain evangelized the idea that staying one step ahead of your adversary is the way to defeat advanced, persistent threats. Key components to staying one step ahe...

Read More

How Panaseer is Leading the Way in Cyber Hygiene for Enterprise Security HOW PANASEER IS LEADING THE WAY IN CYBER HYGIENE FOR ENTERPRISE SECURITY

blog article

Jul 25, 2018

The recent data breaches at Equifax, Uber, Deloitte and Yahoo, are an indication of the ever-growing sophistication of hackers and cyberattacks. If this trend continues, breaches could be bigger, hackers smarter, and security teams more vulnerable. Prevention is better than cure. Defining and implem...

Read More

Ransomware. What are they and how to prevent them? RANSOMWARE. WHAT ARE THEY AND HOW TO PREVENT THEM?

blog article

Jul 25, 2018

What is Ransomware? Ransomware may also be known as ransom-malware is a malicious software which threatens to delete or deny access to data, once it takes over the computer. The cybercriminal demands ransom usually through cryptocurrency or credit card in order to restore the access to the files. Th...

Read More

10 Endpoint Security Problems Solved by the Cloud – Identifying Problems 10 ENDPOINT SECURITY PROBLEMS SOLVED BY THE CLOUD – IDENTIFYING PROBLEMS

blog article

Jul 25, 2018

Can’t Fix What You Can’t See. A single endpoint in a system can generate anywhere from 10,000 to 40,000 individual events in a single day — events that, if you could see them, would give readily help you identify malicious activity that could lead to a harmful attack.  Unfortu...

Read More

TWO MAJOR REASONS WE’RE FAILING AT CYBERSECURITY TWO MAJOR REASONS WE’RE FAILING AT CYBERSECURITY

blog article

Jul 25, 2018

You use email constantly. It’s the lifeblood of communication, commerce and exchange of ideas across your organization. Imagine trying to do your job in 2018 without it. It’s impossible, isn’t it? It’s just supposed to work, and when it doesn’t, everything you do comes ...

Read More

Introducing Radar: Faster Recovery from Ransomware INTRODUCING RADAR: FASTER RECOVERY FROM RANSOMWARE

blog article

Jul 25, 2018

Ransomware is on the rise, and it’s only getting smarter. Recent research shows ransomware attacks grew more than 350% annually. * To defend against attacks, many companies typically focus on building a perimeter to prevent malware from ever entering their data center. However, as malware beco...

Read More

The Latest in Security Style Guide Happenings THE LATEST IN SECURITY STYLE GUIDE HAPPENINGS

blog article

Jul 25, 2018

The Bishop Fox Cybersecurity Style Guide has been constantly evolving since its initial rollout in February 2018. It’s undergone one other iteration (v1.1, which you can find here) – until now, that is. For our audience’s convenience, we decided to create a digital version of the s...

Read More

Ransomware: Are you ready? RANSOMWARE: ARE YOU READY?

blog article

Jul 23, 2018

Ransomware is a lot more than the buzzword du jour. Attacks like WannaCry and Nyetya affected thousands of organizations around the world and cost billions of dollars in damages. While data theft and other types of attacks are very destructive, ransomware takes things to the next level by literally ...

Read More

What is a keylogger? How to Remove Them WHAT IS A KEYLOGGER? HOW TO REMOVE THEM

blog article

Jul 21, 2018

The online world is filled with several types of malware and keyloggers are one of the dangerous malicious codes out there. It records all your keystrokes and sends it to the creator, the information transferred can include login credentials, banking details, internet searches, and private messages....

Read More

Malware Definition and Their Removal Methods MALWARE DEFINITION AND THEIR REMOVAL METHODS

blog article

Jul 20, 2018

There are different types of malware containing unique characteristics and traits. Common malware types include virus, worm, Trojan horse, spyware, browser hijacker, rootkit, and malvertising. Virus: This is a malicious program that spreads by infecting other files or programs. Worm: This malware ca...

Read More

Demystifying: Next-Generation Endpoint Security DEMYSTIFYING: NEXT-GENERATION ENDPOINT SECURITY

blog article

Jul 20, 2018

The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Since we see the term so often, it’s easy to gloss over without giving it much thought. Next-generation pretty obviously implies that the product you’re pu...

Read More

How to Speed Up Boot Time on Your PC or Laptop HOW TO SPEED UP BOOT TIME ON YOUR PC OR LAPTOP

blog article

Jul 19, 2018

Any Windows user would testify that their system boot-up is seemingly quick invariable of the versions that they use on such as Windows 7, 8, or 10. However, it is your actions that slow down your PC and let’s take a quick look at the major reasons behind the long boot times: #Numerous Softwar...

Read More

GandCrab Ransomware Version 4.0/4.1 GANDCRAB RANSOMWARE VERSION 4.0/4.1

blog article

Jul 18, 2018

July has been a busy month for the distributors of GandCrab ransomware. After about two months with no major update, the cybercrime gang behind GandCrab released version 4, and a few days later, version 4.1. The primary delivery method is via compromised WordPress websites, which have been hijacked ...

Read More

What is Malware and How Can We Prevent It? WHAT IS MALWARE AND HOW CAN WE PREVENT IT?

blog article

Jul 18, 2018

What is Malware? Malware, an abbreviated form of malicious software, is a type of software that has been particularly designed to gain access to or damage a computer, mostly without the knowledge of the owner. There are various types of malware, including computer worm, computer viruses, Trojan hors...

Read More

Google Next 2018: Cloud and Mobile Security Showcase GOOGLE NEXT 2018: CLOUD AND MOBILE SECURITY SHOWCASE

blog article

Jul 18, 2018

Google Next 2018 (#GoogleNext18) is almost upon us and we’re delighted to return as a Velocity Partner for this year’s conference. Check Point has a great show planned, so if you plan to be at the Moscone Center in San Francisco July 24 – 26, we invite you to come spend some time w...

Read More

Evaluating the Role of CASBs to Enhance Cloud Security EVALUATING THE ROLE OF CASBS TO ENHANCE CLOUD SECURITY

blog article

Jul 18, 2018

Public cloud computing has taken over the world, it seems. As companies throw more applications and data into computing infrastructure and applications for hire, security and visibility become more of a concern. Cloud access security brokers (CASBs) could be a promising answer to companies strugglin...

Read More

What is a Computer Virus? WHAT IS A COMPUTER VIRUS?

blog article

Jul 17, 2018

A computer virus is a self-replicating program that sometimes spreads by itself into other executable code or documents. Most viruses or worms are malicious programs designed to infect and gain control over vulnerable systems. Viruses spread via email can knock out systems burdened by the enormous a...

Read More

5 Ways To Secure Your Server 5 WAYS TO SECURE YOUR SERVER

blog article

Jul 17, 2018

Servers are very critical. Because they are responsible for running businesses. Which means the moment they crash; your business goes down. Loss of productivity, loss of customers and who knows – if the server is down for a long time – it may even mean the end of your business. Therefore...

Read More

Malware Examples and how to remove them MALWARE EXAMPLES AND HOW TO REMOVE THEM

blog article

Jul 17, 2018

Malware is a broader term for several types of malicious codes created by cybercriminals for preying on online users. Malware is the singly coined word for the words, “Malicious Software”. Today, the cyber attacks have become more common and frequent, targeting small to big organizations...

Read More

Why Malware as a Business is on the Rise WHY MALWARE AS A BUSINESS IS ON THE RISE

blog article

Jul 16, 2018

The alarming growth of malware attacks in the last years should concern each of us, but what is more important, should make us AWARE of the risks and consequences. Taking action and preventing these malicious activities operated by cybercriminals has to be a top priority IF we want to stay safe onli...

Read More

How ‘Small’ Security Errors Lead to a Security Breach HOW ‘SMALL’ SECURITY ERRORS LEAD TO A SECURITY BREACH

blog article

Jul 16, 2018

Fresh off the July 4th holiday, news broke that popular social media aggregator Timehop had been breached. Potentially devastating news? Certainly, a breach ranks among every organization’s worst nightmares. Timehop veered off the typical course and decided to be transparent with the breach &n...

Read More

Building a DevSecOps Culture BUILDING A DEVSECOPS CULTURE

blog article

Jul 16, 2018

Talk to any enterprise that has embraced DevOps and are trying to ensure security is adequately integrated into the organization and they'll likely say the challenge is twofold: tools and culture. Moreover, the most difficult of those two is culture. Integrating security culture into DevOps, or ...

Read More

The Internet of Things era: 6 ways to stay safe THE INTERNET OF THINGS ERA: 6 WAYS TO STAY SAFE

blog article

Jul 14, 2018

In the recent times, we get to hear stories of online criminals spying on people through baby monitors, failing of smart locks after a software update, personal information theft through webcams and stalkers effortlessly preying on their victims with the help of spyware. In simple, security breaches...

Read More

6 Mistakes to Avoid When Choosing Antivirus Software 6 MISTAKES TO AVOID WHEN CHOOSING ANTIVIRUS SOFTWARE

blog article

Jul 13, 2018

In today’s connected world, computers are connected to multiple networks and external devices. This opens the door for hackers to steal valuable data stored on the computers or even control the devices remotely. Online fraudsters make use of viruses, worms and other types of malicious codes to...

Read More

8 Reasons Mobile Apps Access Location + Security Policies to Consider 8 REASONS MOBILE APPS ACCESS LOCATION + SECURITY POLICIES TO CONSIDER

blog article

Jul 12, 2018

A fitness app, called Polar Flow, was recently found to be exposing the name, profile picture and whereabouts of high-ranking military personnel by oversharing user location data. Unfortunately, this is not the only security incident leaking user location. Back in February, Appthority noted how stud...

Read More

Cryptolocker- What Are They And How To Remove Them CRYPTOLOCKER- WHAT ARE THEY AND HOW TO REMOVE THEM

blog article

Jul 12, 2018

In today’s connected world, malware attacks are on the rise. The recent WannaCry ransomware attack which crippled thousands of business across the globe is a good example of the level and sophistication of such attacks. This highlights not only the need for better virus removal or malware remo...

Read More

How to protect Android Devices from Malware Attacks HOW TO PROTECT ANDROID DEVICES FROM MALWARE ATTACKS

blog article

Jul 11, 2018

Google is constantly enhancing features to render Playstore protection from these ever-evolving threats, however, there is no end to users, downloading an infected app. If your Android device is completely slow, or if it consumes too much data then you must be sure that you have downloaded a malicio...

Read More

Need help implementing ISO 27001? NEED HELP IMPLEMENTING ISO 27001?

blog article

Jul 11, 2018

ISO 27001 is the international standard that describes best practice for an ISMS (information security management system). Successful ISO 27001 implementation relies on commitment and support from top management, so we’ve put together a bundle to help you get that support. Why achieve ISO 2700...

Read More

What is a computer worm virus? How they infect and methods to remove them WHAT IS A COMPUTER WORM VIRUS? HOW THEY INFECT AND METHODS TO REMOVE THEM

blog article

Jul 10, 2018

What is a Computer Worm Virus. The term worm in computing refers to a malicious software whose main role is to infect computers, remain active on the infected system and self-replicate. A computer worm is programmed to duplicate rapidly and spread to uninfected computers. A user realizes the existen...

Read More

Employee Security Awareness Training – Management Side EMPLOYEE SECURITY AWARENESS TRAINING – MANAGEMENT SIDE

blog article

Jul 09, 2018

As many organizations have learned to their regret, a policy for cybersecurity – however comprehensive, proactive, and technologically sound it may be – is doomed to failure if its terms aren’t adhered to by stakeholders of the enterprise, across the board. This emphasizes the need...

Read More

June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors JUNE’S MOST WANTED MALWARE: BANKING TROJANS UP 50% AMONG THREAT ACTORS

blog article

Jul 05, 2018

Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining Remains Tops on List. Over the past four months, banking Trojans have increased their global impact by 50 percent, as two Trojan malware families enter the latest Global...

Read More

What is Spyware and How To Protect Your PC WHAT IS SPYWARE AND HOW TO PROTECT YOUR PC

blog article

Jul 04, 2018

Spyware is a malicious software which is implanted by a hacker on victim’s computing device with the intention of stealing confidential information without the end user’s intent. The confidential information might include gathering PINs and credit card numbers, passwords, monitoring pass...

Read More