RESOURCES


home.aspx
   
Password Security : 3 Helpful Tips To Make Your Passwords As Secure As Possible PASSWORD SECURITY : 3 HELPFUL TIPS TO MAKE YOUR PASSWORDS AS SECURE AS POSSIBLE

blog article

Mar 22, 2019

Today, almost everyone is on the internet, yet many people still have not learned lessons about securing online passwords. Password security is a legitimate issue, and if you overlook it, it could put you at great risks. While advanced techniques such as fingerprints and facial recognition have beco...

Read More

Cyber Attacks on Financial Institutions are the Modern-Day Bank Robbery CYBER ATTACKS ON FINANCIAL INSTITUTIONS ARE THE MODERN-DAY BANK ROBBERY

blog article

Mar 22, 2019

The financial sector has long been a target of cyber thieves. But despite their robust security postures, they continue to be the focus of some of the most innovative attack campaigns. Cybercriminals are laser focused on crafting attacks that will yield the most amount of revenue for the least amoun...

Read More

North Carolina’s Orange County Hit by Third Ransomware Attack in Six Years NORTH CAROLINA’S ORANGE COUNTY HIT BY THIRD RANSOMWARE ATTACK IN SIX YEARS

blog article

Mar 22, 2019

Orange County in North Carolina suffered its third ransomware infection in six years, the local government announced on its website on Monday. The attack, probably stemming from a phishing email, a very common practice in such situations, crippled the county’s IT infrastructure and left a numb...

Read More

Millions of Facebook Passwords Kept in Plain Text for Employees to Access MILLIONS OF FACEBOOK PASSWORDS KEPT IN PLAIN TEXT FOR EMPLOYEES TO ACCESS

blog article

Mar 22, 2019

Perhaps we should all change our Facebook passwords to play it safe, following news that Facebook kept, from as early as 2012, “hundreds of millions” of user account passwords in plain text, making them available to some 20,000 employees, writes KrebsOnSecurity following a tip from a sou...

Read More

THE HOTTEST CYBERSECURITY SKILLS OF 2019 THE HOTTEST CYBERSECURITY SKILLS OF 2019

blog article

Mar 21, 2019

Cybersecurity Ventures estimated 3.5 million unfilled cybersecurity jobs by 2021, and the United States is moving on pace to hit half-a-million or more unfilled cybersecurity positions by 2021. [1] We are just a couple of months into 2019, and looking at the above statistics, we can expect to have m...

Read More

WOW, Phishing Attacks Are Now More Common Than Malware WOW, PHISHING ATTACKS ARE NOW MORE COMMON THAN MALWARE

blog article

Mar 21, 2019

Microsoft’s security team is uniquely positioned to analyze trends in cyber security threats. Their frequent Security Intelligence Reports (SIR) are an excellent indicator of these trends. Redmond's numbers are based on their internal scan of O365 email addresses. Get the latest SIR here. ...

Read More

FILELESS MALWARE: UNDERSTANDING THE INVISIBLE CYBERATTACK FILELESS MALWARE: UNDERSTANDING THE INVISIBLE CYBERATTACK

blog article

Mar 20, 2019

Fileless Malware: What It Stands For? Fileless malware, or non-malware, is a zero-footprint attack that does not depend on any malicious software to spread and infect the user’s machine. It, instead, finds existing vulnerabilities in the machine and takes advantage of it. Fileless malware illu...

Read More

How to Secure Your Online Brand HOW TO SECURE YOUR ONLINE BRAND

blog article

Mar 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business. Adversaries are routinely impersonating businesses and critical online services to target customers and significant business trans...

Read More

The Intersections between Cybersecurity and Diversity THE INTERSECTIONS BETWEEN CYBERSECURITY AND DIVERSITY

blog article

Mar 20, 2019

Cybersecurity and diversity are high-value topics that are most often discussed in isolation. Both topics resonate with individuals and organizations alike. However, the intersections between cybersecurity and diversity are often overlooked. As nations and organizations seek to protect their critica...

Read More

Tips To Keep Your Small To Medium-Size Business (SMB’s) Data Safe & Secure TIPS TO KEEP YOUR SMALL TO MEDIUM-SIZE BUSINESS (SMB’S) DATA SAFE & SECURE

blog article

Mar 20, 2019

With all the data breaches and frauds taking place every day, it’s no secret that new business owners and marketers need to be more aware of the cyber threats that can drastically affect their business as well as personal data. Many business owners think that their data and assets are protecte...

Read More

BEC Goes Mobile as Cybercriminals Turn to SMS BEC GOES MOBILE AS CYBERCRIMINALS TURN TO SMS

blog article

Mar 19, 2019

Business email compromise (BEC) is a term that encompasses a variety of techniques and tactics that cybercriminals leverage to obtain money or data via identity deception. Despite the evolution and repurposing of this suite of associated tactics, one constant has remained throughout—the corres...

Read More

Google Play is flooded with hundreds of unsafe anti-virus products GOOGLE PLAY IS FLOODED WITH HUNDREDS OF UNSAFE ANTI-VIRUS PRODUCTS

blog article

Mar 19, 2019

A new study conducted by AV-Comparatives, a well-respected independent testing agency, has closely examined whether 250 security products for Android smartphones are capable of protecting users at all. The test evaluated whether Android anti-virus products available in the official Google Play store...

Read More

HOW TO KEEP SPIDER WEBS, BUGS OR INSECTS AWAY FROM SECURITY CAMERAS HOW TO KEEP SPIDER WEBS, BUGS OR INSECTS AWAY FROM SECURITY CAMERAS

blog article

Mar 19, 2019

If you have security cameras outside your home, you might be wondering why spiders love to spin cobwebs across camera lenses. The truth is, spiders don’t actually love your cameras—they love the bugs attracted to the infrared light emitting from your camera. This can be a real issue for ...

Read More

Arbitrary Directory Deletion in WP-Fastest-Cache ARBITRARY DIRECTORY DELETION IN WP-FASTEST-CACHE

blog article

Mar 18, 2019

The WP-Fastest-Cache plugin authors released a new update, version 0.8.9.1, fixing a vulnerability (CVE-2019-6726) present during its install alongside the WP-PostRatings plugin. According to seclists.org: A successful attack allows an unauthenticated attacker to specify a path to a directory from w...

Read More

Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry DETECTING CYBERATTACKS THROUGH THE EVER-EVOLVING CYBERSECURITY INDUSTRY

blog article

Mar 18, 2019

Cybersecurity has come a long way since its inception in the 1990s.1 In the beginning, hackers were generally considered a nuisance, and their hacks – which were pretty limited in terms of their scope – were designed more to cause trouble than harm. When the internet began to take centre...

Read More

Chinese Hackers Targeting Universities in Attempting to Gain Military secrets CHINESE HACKERS TARGETING UNIVERSITIES IN ATTEMPTING TO GAIN MILITARY SECRETS

blog article

Mar 18, 2019

iDefense, a cybersecurity intelligence unit of Accenture Security, has recently reported that at least 27 different universities in the United States, Canada, and Southeast Asia have been targeted by the attackers including the University of Hawaii, Massachusetts Institute of Technology (MIT) and th...

Read More

New Customization Center Gives Organizations More Control of Training Content NEW CUSTOMIZATION CENTER GIVES ORGANIZATIONS MORE CONTROL OF TRAINING CONTENT

blog article

Mar 15, 2019

We are excited to announce the launch of a new feature that will enable our customers to deliver security awareness training that more effectively meets unique organizational goals. The self-service Customization Center in the Proofpoint Security Education Platform gives program administrators acces...

Read More

SSL Based Cyber-attacks Increase by 400% Over the Last Year SSL BASED CYBER-ATTACKS INCREASE BY 400% OVER THE LAST YEAR

blog article

Mar 15, 2019

A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasingly using encryption as part of their toolkit to evade detection and launch malware. When data is encrypted, it cannot be accessed and exploited by unauthorised users. If you are se...

Read More

Uncommon Radixes Used in Malware Obfuscation UNCOMMON RADIXES USED IN MALWARE OBFUSCATION

blog article

Mar 15, 2019

Some JavaScript features allow for pretty interesting obfuscation techniques. For example, did you know that virtually any English word can be used as a valid number? I recently decoded a credit card stealing script injected at the bottom of a js/varien/js.js file: There were several layers of obfus...

Read More

Joomla! Releases 3.9.4 Addressing New Security Vulnerabilities JOOMLA! RELEASES 3.9.4 ADDRESSING NEW SECURITY VULNERABILITIES

blog article

Mar 15, 2019

The latest version of the Joomla! 3.x series was released on March 12, 2019. Version 3.9.4 addresses four security flaws and 28 bug fixes, which includes a high-priority access level vulnerability. Three of the four security flaws are cross-site scripting (XSS) vulnerabilities, which have been ident...

Read More

Are you Protected against These Common Types of Cyber Attacks? ARE YOU PROTECTED AGAINST THESE COMMON TYPES OF CYBER ATTACKS?

blog article

Mar 14, 2019

The types of cyber-security attacks that businesses need to protect themselves from are continually growing and evolving. Keeping your company secure means having insight into the most common threats, and the categories of cyber attacks that might go unnoticed. From how to use the principle of least...

Read More

Security Pros and Perils of Serverless Architecture SECURITY PROS AND PERILS OF SERVERLESS ARCHITECTURE

blog article

Mar 14, 2019

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software development. While serverless architecture offers ...

Read More

Making it Rain - Cryptocurrency Mining Attacks in the Cloud MAKING IT RAIN - CRYPTOCURRENCY MINING ATTACKS IN THE CLOUD

blog article

Mar 14, 2019

Organizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of. One of th...

Read More

OneDrive for Business Security: The Mystery Is Solved ONEDRIVE FOR BUSINESS SECURITY: THE MYSTERY IS SOLVED

blog article

Mar 14, 2019

Over the past few years, organizations have gradually adopted cloud technologies for a wide range of business purposes. Usually, the cloud service utilized first is file storage. Cloud storage enables all business, from small to large, to control costs while ensuring high availability of their data....

Read More

WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING

blog article

Mar 14, 2019

Continuous learning has many benefits and with the “ever-evolving” technology, learning is the only tool to keep yourself updated and ahead of the competition. In this article, let us see how powerful the approach of continuous training is, especially when it is applied to a cybersecurit...

Read More

How to Use Forensic Data to Improve Cybersecurity HOW TO USE FORENSIC DATA TO IMPROVE CYBERSECURITY

blog article

Mar 14, 2019

What’s the first thing you think of when you hear the word “forensics?” Odds are, if you’re like most Americans, the first thing you thought about was a crime & mystery show like NCIS, CSI, or Law & Order. However, forensics plays a role in cybersecurity, too. Many ne...

Read More

Emsisoft Mobile Security scores top marks in AV-Comparatives’ Android Test 2019 EMSISOFT MOBILE SECURITY SCORES TOP MARKS IN AV-COMPARATIVES’ ANDROID TEST 2019

blog article

Mar 14, 2019

Mobile antivirus apps have come under close scrutiny in recent years, thanks, in no small part, to bogus security apps like Virus Shield that don’t actually do anything. Dozens of other security apps have been identified as trojans or been found to provide ineffective protection. Of course, th...

Read More

Q&A: Cybersecurity has become a primal battleground for AI one-upmanship Q&A: CYBERSECURITY HAS BECOME A PRIMAL BATTLEGROUND FOR AI ONE-UPMANSHIP

blog article

Mar 13, 2019

A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities. When antivirus (AV) software first arrived in the late 1980s, the science of combating computer viruses was very straightforward. AV kept close track of known malicious files, ...

Read More

The Long Road Toward Building Secure Software at Enterprise Scale THE LONG ROAD TOWARD BUILDING SECURE SOFTWARE AT ENTERPRISE SCALE

blog article

Mar 13, 2019

security of their software. Urgency to improve application security came when there was a wave of exploits and automated attacks in the form of worms and exploits started to hit. Unfortunately, since then, while software makers, software services providers, and enterprises began working to improve t...

Read More

Clinic hit by ransomware recovers in hours thanks to solid incident response plan CLINIC HIT BY RANSOMWARE RECOVERS IN HOURS THANKS TO SOLID INCIDENT RESPONSE PLAN

blog article

Mar 13, 2019

Maffi Clinics, a chain of plastic surgery clinics in the United States, is notifying patients about a ransomware incident that briefly affected its systems. Unlike most cases involving ransomware, though, this one didn’t leave a scar, illustrating the power of strong security protocols. Accord...

Read More

Cybersecurity for the hospitality sector: What you need to know CYBERSECURITY FOR THE HOSPITALITY SECTOR: WHAT YOU NEED TO KNOW

blog article

Mar 13, 2019

Marriott International. Hilton. Four Seasons. Trump Hotels. InterContinental. Hard Rock Hotel. These are some of the biggest hospitality chains in the business. But there’s another detail also that connects the above names: In the last couple of years, all of them have been at the receiving en...

Read More

Planning Your 2019 Cyber Security Budget: A How-To Guide PLANNING YOUR 2019 CYBER SECURITY BUDGET: A HOW-TO GUIDE

blog article

Mar 13, 2019

As we have entered the new year, all of us are busy planning our IT budgets for the year. Have you discovered how to plan your cybersecurity budget for 2019? If not, then let’s investigate some facts and figures as to why cybersecurity should remain the highest priority in creating your IT bud...

Read More

Important Cyber Security Awareness Practices for Senior Citizens IMPORTANT CYBER SECURITY AWARENESS PRACTICES FOR SENIOR CITIZENS

blog article

Mar 13, 2019

Using the internet lets you keep learning, connect with your loved ones and enjoy leisure activities. Older adults are increasingly becoming digitally savvy-but for some, the online world is a dangerous place. With more and more people are getting to grips with the Internet, cyber crimes such as onl...

Read More

WHAT MAKES UP A MONITORED ALARM SYSTEM? WHAT MAKES UP A MONITORED ALARM SYSTEM?

blog article

Mar 12, 2019

The distinction for a monitored alarm system is people for protection. Monitored alarm systems are connected to 24/7 monitoring center operators so your home is protected against theft, fire and carbon monoxide while you are out and about. The New York Post recently reported that Americans check the...

Read More

The Advanced Persistent Threat files: Lazarus Group THE ADVANCED PERSISTENT THREAT FILES: LAZARUS GROUP

blog article

Mar 12, 2019

We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed attacks on specific targets with the intention to compromise their systems and gain information from or about that target. While the targets may be anyone or anything&m...

Read More

Magecart Isn’t Just a Security Problem; It’s Also a Business Problem MAGECART ISN’T JUST A SECURITY PROBLEM; IT’S ALSO A BUSINESS PROBLEM

blog article

Mar 12, 2019

Magecart is more than just a security problem—it’s also a business problem. When threat actors breached British Airways in September resulting in the compromise of thousands of customers’ credit cards, the world got a look at what the fallout of a modern security breach looks like....

Read More

Misconfigured Enterprise Box accounts leak terabytes of sensitive internal data MISCONFIGURED ENTERPRISE BOX ACCOUNTS LEAK TERABYTES OF SENSITIVE INTERNAL DATA

blog article

Mar 12, 2019

Pen-testing experts have made a worrisome discovery regarding the popular cloud storage service Box, specifically the Enterprise version used by some of the world’s biggest companies. Following up on a warning issued by infosec geeks earlier last year that failed to gain traction, Adversis res...

Read More

It’s Time Manufacturers Assemble a Sound Cybersecurity Effort IT’S TIME MANUFACTURERS ASSEMBLE A SOUND CYBERSECURITY EFFORT

blog article

Mar 12, 2019

Recently the ISACA (Information Systems Audit and Control Association) and the Digital Manufacturing and Design Innovation Institute (DMDII) together conducted a survey that aimed to pinpoint the current cybersecurity challenges faced by the manufacturing industry. According to the ISACA and the DMD...

Read More

SECURING EMAIL FOR AN ORGANIZATION SECURING EMAIL FOR AN ORGANIZATION

blog article

Mar 12, 2019

It might seem odd at first to preface an article on email security with a history lesson. Ultimately though, understanding the primary problem email was designed to solve, and the fact that security was loosely bolted on after-the-fact in tiny bursts over many decades, helps tremendously in understa...

Read More

Five Mistakes that Could Lead to a Third-Party Data Breach FIVE MISTAKES THAT COULD LEAD TO A THIRD-PARTY DATA BREACH

blog article

Mar 12, 2019

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password required. Outsour...

Read More

The 7 Deadly Cybersecurity Sins You Need to Evade THE 7 DEADLY CYBERSECURITY SINS YOU NEED TO EVADE

blog article

Mar 12, 2019

Everyone makes mistakes. The problem for businesses is that cybersecurity mistakes can often lead to data breaches, service outages, and other issues that severely impact the continued viability of the company. Yet, businesses can learn from their network security mistakes and come out stronger for ...

Read More

USE YOUR DISCRETION: CYBER AWARENESS EDUCATION FOR EMPLOYEES USE YOUR DISCRETION: CYBER AWARENESS EDUCATION FOR EMPLOYEES

blog article

Mar 12, 2019

Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what files to download, what portable media to plug in and what sites to visit. There is an as...

Read More

Have we become addicted to passwords? HAVE WE BECOME ADDICTED TO PASSWORDS?

blog article

Mar 11, 2019

In today’s technology age, there are creeping addictions that many have but few acknowledge. The worst pandemic of which we suffer today may actually be an addiction to passwords as the primary security perimeter to our cyber assets. Think about it for a second. How many passwords do you need ...

Read More

Multi-cloud Complicates Security MULTI-CLOUD COMPLICATES SECURITY

blog article

Mar 11, 2019

The agility and benefits of cloud computing are undeniable. Forrester predicts that the total global public cloud market will be $178 billion in 2018, up from $146 billion in 2017, and will continue to grow at a 22 percent compound annual growth rate. And IDC forecasts that by 2020, more than 90 per...

Read More

The need for international agreements on cybersecurity THE NEED FOR INTERNATIONAL AGREEMENTS ON CYBERSECURITY

blog article

Mar 11, 2019

Over the last decade or so, it has become increasingly obvious that cybersecurity is no longer just a local issue. As the world has leaped into a digital era with communication in the blink of an eye and the click of a mouse, cybersecurity has gone beyond borders. It is now a truly global phenomenon...

Read More

Columbia Surgical Specialists Pays Almost $15k Ransom Following Ransomware Attack COLUMBIA SURGICAL SPECIALISTS PAYS ALMOST $15K RANSOM FOLLOWING RANSOMWARE ATTACK

blog article

Mar 11, 2019

A ransomware attack on Spokane, Washington-based Columbia Surgical Specialists on Jan. 9 resulted in unauthorized access of medical records of almost 400,000 patients, the healthcare provider said in a press release. Although the FBI and security companies advise organizations not give in to hacker ...

Read More

Jackson County pays ransomware operators $400k to regain access to computers JACKSON COUNTY PAYS RANSOMWARE OPERATORS $400K TO REGAIN ACCESS TO COMPUTERS

blog article

Mar 11, 2019

Officials in Jackson County, a rural area in the southeastern US state of Georgia, were forced over the weekend to pay hackers almost half a million dollars after a ransomware attack brought its entire fleet of computer systems to its knees. According to statescoop.com, the county government’s...

Read More

Switching to Elasticsearch to Improve Cybersecurity at the home of the World’s Fastest Supercomputer SWITCHING TO ELASTICSEARCH TO IMPROVE CYBERSECURITY AT THE HOME OF THE WORLD’S FASTEST SUPERCOMPUTER

blog article

Mar 11, 2019

This post is a recap of a community talk given at a recent Elastic{ON} Tour event. Interested in seeing more talks like this? Check out the conference archive or find out when the Elastic{ON} Tour is coming to a city near you. The fastest supercomputer in the world, Summit, is housed at Oak Ridge Na...

Read More

Fortinet Recognized as Best Security Company at 2019 SC Magazine Awards FORTINET RECOGNIZED AS BEST SECURITY COMPANY AT 2019 SC MAGAZINE AWARDS

blog article

Mar 11, 2019

Last week at RSA Conference 2019, Fortinet won an Excellence Award for "Best Security Company" and a Trust Award for “Best UTM Security Solution” at the 2019 SC Awards held in San Francisco during RSAC. “The Excellence Award honors those organizations and individuals whos...

Read More

CHECKING YOUR VPN FOR DATA LEAKS CHECKING YOUR VPN FOR DATA LEAKS

blog article

Mar 11, 2019

It’s hard to travel far online without running into an article or advertisement for a virtual private network (VPN). As internet security concerns have grown, so has the demand for tools and services to fight back against hackers and their malware attacks. While coming up with hard numbers is ...

Read More

Emsisoft releases a free decrypter for BigBobRoss Ransomware EMSISOFT RELEASES A FREE DECRYPTER FOR BIGBOBROSS RANSOMWARE

blog article

Mar 10, 2019

Our research team has uncovered a new ransomware campaign we nicknamed BigBobRoss that seems to target Comcast Business users. Fortunately, our security experts were able to identify a flaw within the ransomware’s code that can be used to decrypt encrypted files without paying the ransom. Tech...

Read More

The End of Coinhive; The end of cryptojacking? THE END OF COINHIVE; THE END OF CRYPTOJACKING?

blog article

Mar 08, 2019

Will Coinhive’s end lead to the end of browser-based cryptomining and cryptojacking? Cryptojacking stole the limelight away from ransomware at the end of 2017, becoming a major cyberthreat that continued into 2018. On March 8, 2019 Coinhive, the service that enables websites around the world t...

Read More

Google Chrome zero-day: Now is the time to update and restart your browser GOOGLE CHROME ZERO-DAY: NOW IS THE TIME TO UPDATE AND RESTART YOUR BROWSER

blog article

Mar 08, 2019

It’s not often that we hear about a critical vulnerability in Google Chrome, and perhaps it’s even more rare when Google’s own engineers are urging users to patch. There are several good reasons why you need to take this new Chrome zero-day (CVE-2019-5786) seriously. For starters, ...

Read More

IoT devices a growing part of global DDoS weapon arsenals IOT DEVICES A GROWING PART OF GLOBAL DDOS WEAPON ARSENALS

blog article

Mar 08, 2019

Machine-to-machine communications are increasingly exploited in distributed denial of service (DDoS) attacks. The use of IoT devices in synchronized attacks is growing globally, with China listed as the top host country for DDoS weapons, followed at distance by the United States. The most common pro...

Read More

Why you’re putting your network at risk with a defensive approach to malware WHY YOU’RE PUTTING YOUR NETWORK AT RISK WITH A DEFENSIVE APPROACH TO MALWARE

blog article

Mar 08, 2019

It’s a mad, mad, mad, malware world. The good news is that the number of malware attacks is decreasing. The bad news is that malware forms are proliferating, attackers are getting smarter, and companies are still vulnerable. Just how bad is the problem? The answer is: very. While known threats...

Read More

CyberSecurity First Responders: Who are they and why enterprises should hire them CYBERSECURITY FIRST RESPONDERS: WHO ARE THEY AND WHY ENTERPRISES SHOULD HIRE THEM

blog article

Mar 08, 2019

In our day-to-day lives, emergencies or accidents can and do happen. It can be on the roads, in the air, on the tracks – anywhere. When an incident like this occurs, the first people on the scene are the first responders – fire-fighters in the case of a fire, a traffic officer in the cas...

Read More

How To Move Data To A Backup Site HOW TO MOVE DATA TO A BACKUP SITE

blog article

Mar 08, 2019

There are so many techniques for moving data from one location to another that it can be hard to determine which one is right for the job. Small business owners, in particular, can become immensely stressed out when trying to figure out how to securely transfer their data, especially if sensitive cu...

Read More

Is Your Business in Danger from a Security Gap? IS YOUR BUSINESS IN DANGER FROM A SECURITY GAP?

blog article

Mar 07, 2019

in a perfect world, businesses wouldn’t have to worry about cybersecurity. Instead of worrying about becoming the next “Massive Data Breach at headline, they would be able to focus solely on growing their market share. Unfortunately, that isn’t the case. Every day, malicious actors...

Read More

THE TRUTH ABOUT THE GROWING CYBERSECURITY SKILL GAP THE TRUTH ABOUT THE GROWING CYBERSECURITY SKILL GAP

blog article

Mar 07, 2019

Cybersecurity is a growing industry with a prominent issue of the skill gap. Even the World Economic Forum mentioned in its January 2019 report that the United States has over 200,000 cybersecurity skills requiring job vacancies and employers are facing a tough time to fill them [1]. This huge imbal...

Read More

INSIDER THREATS: THE SIGNS YOU WON’T SEE TILL YOU DO INSIDER THREATS: THE SIGNS YOU WON’T SEE TILL YOU DO

blog article

Mar 07, 2019

Insider threats are employee-performed threats that are becoming more common. According to CA Technologies, 31% of the organizations believe that insider threat causes more damage as compared to those 14% who believe damages from external threats are more acute [1]. Yet, most of the employers do not...

Read More

6 SKILLS REQUIRED FOR A CAREER IN DIGITAL FORENSICS 6 SKILLS REQUIRED FOR A CAREER IN DIGITAL FORENSICS

blog article

Mar 07, 2019

Digital forensics, a branch of forensic science, is an increasingly popular domain, with many lucrative and career advancement opportunities in various industries. The science of digital forensics helps track hackers, retrieve stolen data, investigate the causes of incidents, and provide digital evi...

Read More

5 WAYS AN ONLINE CYBERSECURITY CERTIFICATION CAN BOOST YOUR CAREER 5 WAYS AN ONLINE CYBERSECURITY CERTIFICATION CAN BOOST YOUR CAREER

blog article

Mar 07, 2019

The concept of upgrading skills without going full time has generated a lot of buzz. Simply search for “certifications in demand” in any search engine, and you will see enormous results in a fraction of a second. You will come across many certification programs belonging to different ver...

Read More

9 LATEST CYBER-ESPIONAGE AFFAIRS 9 LATEST CYBER-ESPIONAGE AFFAIRS

blog article

Mar 07, 2019

Espionage among nations is not a new phenomenon; it has existed since the early medieval period. The world of spies has evolved with the times, and we are now facing a bigger challenge under the name of cyber espionage. This new form of organized and deliberate threat uses cyber warfare techniques t...

Read More

BUSINESS SECURITY: HOW TO PREVENT INSIDER ATTACKS BUSINESS SECURITY: HOW TO PREVENT INSIDER ATTACKS

blog article

Mar 07, 2019

Most security solutions are designed to protect against outside threats. However, research shows business owners should focus more on insider attacks. According to a study conducted by Cybersecurity Insiders, 90 percent of organizations feel at risk of an insider attack, with 53 percent of responden...

Read More

How to Add SSL & Move WordPress from HTTP to HTTPS HOW TO ADD SSL & MOVE WORDPRESS FROM HTTP TO HTTPS

blog article

Mar 06, 2019

Moving a WordPress website from HTTP to HTTPS should be a priority for any webmaster. Recent statistics show that over 33% of website administrators across the web use WordPress and many of these websites have still not added an SSL certificate. Why is Important to Have a WordPress SSL Certificate? ...

Read More

The not-so-definitive guide to cybersecurity and data privacy laws THE NOT-SO-DEFINITIVE GUIDE TO CYBERSECURITY AND DATA PRIVACY LAWS

blog article

Mar 06, 2019

US cybersecurity and data privacy laws are, to put it lightly, a mess. Years of piecemeal legislation, Supreme Court decisions, and government surveillance crises, along with repeated corporate failures to protect user data, have created a legal landscape that is, for the American public and America...

Read More

Spotlight on Troldesh ransomware, aka Shade SPOTLIGHT ON TROLDESH RANSOMWARE, AKA SHADE

blog article

Mar 06, 2019

Despite the decline in the number of ransomware infections over the last year, there are several ransomware families that are still active. Ransom.Troldesh, aka Shade, is one of them. According to our product telemetry, Shade has experienced a sharp increase in detections from Q4 2018 to Q1 2019. Wh...

Read More

Is CompTIA Security+ Worth It? A Salary Perspective IS COMPTIA SECURITY+ WORTH IT? A SALARY PERSPECTIVE

blog article

Mar 05, 2019

IT security is expected to grow 28 percent between 2016 and 2026, making this field an attractive career option. Many professionals turn to certifications to gain a competitive advantage in the marketplace. Today, we take a closer look at the CompTIA Security+ certification and ask the question &nda...

Read More

Why Internet Security in 2019 Is More Important Than Ever WHY INTERNET SECURITY IN 2019 IS MORE IMPORTANT THAN EVER

blog article

Mar 05, 2019

There is no denying that a lot of tasks nowadays are performed online, our mobile phones, laptops, and tablets have become an extension of ourselves. However, internet security has become a major issue in this digital era. This is most likely due to the hackers and cyber criminals that disguise them...

Read More

DARPA to Develop $10 Million Open Source Voting System DARPA TO DEVELOP $10 MILLION OPEN SOURCE VOTING SYSTEM

blog article

Mar 05, 2019

The US election might be different in 2020 thanks to a project by DARPA (Defense Advanced Research Projects Agency), the US Department of Defense research division, aiming at bullet-proofing voting machines by moving away from proprietary software that can’t be properly evaluated for bugs, wri...

Read More

What is Ripper Virus? WHAT IS RIPPER VIRUS?

blog article

Mar 05, 2019

Ripper is a type of virus that randomly infects disk write heads when its active in memory. It infects the disk writes, making the data invalid. Ripper virus can be less harmful, or it can be threatening, or it can destroy the whole system. Regardless of the intensity of the attack, be it big or sma...

Read More

Cyber Risk Considerations During the M&A Process CYBER RISK CONSIDERATIONS DURING THE M&A PROCESS

blog article

Mar 05, 2019

Data breaches are a constant in today’s headlines, but in recent years the risk has been front and center of some of the most significant M&A deals. In 2017, Verizon discounted its acquisition price by $350 million when Yahoo belatedly disclosed that it experienced several massive breaches...

Read More

A Guide to Business Endpoint Security A GUIDE TO BUSINESS ENDPOINT SECURITY

blog article

Mar 05, 2019

What is endpoint security? Endpoint security is the protection of endpoints - any and all devices that connect to your business network including laptops and mobile devices. Protecting business devices is essential, not only because they likely contain sensitive data and customer information, but th...

Read More

For Cybersecurity to be Successful, Company Culture Matters FOR CYBERSECURITY TO BE SUCCESSFUL, COMPANY CULTURE MATTERS

blog article

Mar 05, 2019

Whether your business has only one location or is a multinational corporation, company culture matters, especially in the case of cybersecurity. When security is treated as a priority from the top down and in every office location, it has the best chance of successfully fending off attacks. Two of t...

Read More

Seasoned Pros Share Career Advice for Cybersecurity Success SEASONED PROS SHARE CAREER ADVICE FOR CYBERSECURITY SUCCESS

blog article

Mar 05, 2019

Whether you are just kicking off your career in cybersecurity or are in the process of building a security team, it can be difficult to know where you should focus your attention to avoid potential missteps along the way. To help, we asked some seasoned pros to share what they’ve learned over ...

Read More

What is a Man in the Middle Attack, and How Do I Prevent It? WHAT IS A MAN IN THE MIDDLE ATTACK, AND HOW DO I PREVENT IT?

blog article

Mar 05, 2019

Modern technologies such as Wi-Fi networks have created enormous convenience for businesses. The ability to connect computers and other assets to a network without having to run data cabling to every workstation simplifies setting up new workers and workstations. However, Wi-Fi access points have al...

Read More

Breach Readiness as a Service: Why You Need it Now BREACH READINESS AS A SERVICE: WHY YOU NEED IT NOW

blog article

Mar 04, 2019

Canada's new data breach reporting requirements, contained in Division 1.1 of PIPEDA, are in effect. Are you prepared? If you've ever thought "I don't have information that anyone would want" or "I'm too small to be a target for a cyber-attack", then you're al...

Read More

Learn About Quantum Computers and Security at RSAC 2019 LEARN ABOUT QUANTUM COMPUTERS AND SECURITY AT RSAC 2019

blog article

Mar 04, 2019

We’re pleased to say that the QuintessenceLabs team has prepared an exciting display for the annual RSA Conference, all about the security risk of quantum computers and quantum cybersecurity solutions that address it. Find us on the expo floor at booth 1735 in the South Hall, not far from the ...

Read More

Nothing Can Disrupt a Business Faster Than a Data Breach NOTHING CAN DISRUPT A BUSINESS FASTER THAN A DATA BREACH

blog article

Mar 01, 2019

Breach readiness must take center stage for every organization. It is no longer a matter of ‘if’ a breach will occur but ‘when’. Nothing can disrupt a business faster than a data breach. Any organization that stores or handles any personally identifiable information (PII) for...

Read More

MNOs seek stronger mobile security for customers MNOS SEEK STRONGER MOBILE SECURITY FOR CUSTOMERS

blog article

Mar 01, 2019

Avast partners with mobile carriers to provide the security consumers need. Data breaches, stolen passwords, spyware — consumers are all too familiar with the dangers of today’s digital world, and they’re worried. According to a study done by Wipro, if you take all the data theft o...

Read More

3 Unique Ways App Development Companies Can Improve Cyber Security Processes 3 UNIQUE WAYS APP DEVELOPMENT COMPANIES CAN IMPROVE CYBER SECURITY PROCESSES

blog article

Mar 01, 2019

The modern world is addicted to the use of mobile devices. Virtually every activity or task handled electronically can be performed with a mobile device, including: shopping, banking, entertainment, and even controlling other devices in the workplace, shop, and home. No doubt, app development compan...

Read More

Chrome Bug Allows Tech Support Scammers To Send You Into a Loop CHROME BUG ALLOWS TECH SUPPORT SCAMMERS TO SEND YOU INTO A LOOP

blog article

Feb 28, 2019

There are a lot of benefits to using Google’s Chrome Browser. One of them; it’s generally pretty efficient at getting you where you want to go. However, a new scam has become a thorn in Chrome’s side in that area. It actually spins the browser into a tizzy and uses all of Chrome&rs...

Read More

IT Risks in the Education Sector: Real Threats vs. Expectations IT RISKS IN THE EDUCATION SECTOR: REAL THREATS VS. EXPECTATIONS

blog article

Feb 28, 2019

In this blog post, which is based on the results of Netwrix’s 2018 IT Risks Report, we will dive deeper into the problems that face schools, colleges, universities and other educational organizations. The survey covers the six most common types of IT risks: physical damage, intellectual proper...

Read More

Password Managers - Popular and Safe PASSWORD MANAGERS - POPULAR AND SAFE

blog article

Feb 28, 2019

Password mangers are great and they absolutely should be used, especially as we are in an age of almost every company offering an online presence that requires a sign up and multimillion record account breaches. It was with this in mind that I was very disappointed to read yet another article that s...

Read More

Is antivirus protection necessary for my business? IS ANTIVIRUS PROTECTION NECESSARY FOR MY BUSINESS?

blog article

Feb 28, 2019

With threats like ransomware, businesses can’t afford to leave their networks and data unsecured. If you've been wondering whether your business requires antivirus protection, the short answer is yes. Even though Windows 10 has its own well-rated built-in antivirus program, Windows Defende...

Read More

The Ransomware Threat isn’t Over. It’s Evolving THE RANSOMWARE THREAT ISN’T OVER. IT’S EVOLVING

blog article

Feb 28, 2019

This is the third of a three-part report on the state of three malware categories: miners, ransomware and information stealers. Ransomware is any malware that holds your data ransom. These days it usually involves encrypting a victim’s data before asking for cash (typically cryptocurrency) to ...

Read More

A Cybersecurity Checklist for Modern SMBs A CYBERSECURITY CHECKLIST FOR MODERN SMBS

blog article

Feb 28, 2019

The landscape of digital security is rapidly shifting, and even the largest tech giants are scrambling to keep up with new data regulations and cybersecurity threats. Small to medium-sized businesses (SMBs) are often left out of these important conversations, leaving themselves — and their use...

Read More

How Did January Kick Off Threat Protection? HOW DID JANUARY KICK OFF THREAT PROTECTION?

blog article

Feb 28, 2019

It is often said that each new year brings more cybersecurity threats than the previous one. So, how is 2019 shaping up so far compared to 2018? Has the new year kicked off with better threat protection than the last year, or are cyber threats getting worse? Let’s look at some of the major eve...

Read More

Endpoint Protection: Taking the Proactive Approach ENDPOINT PROTECTION: TAKING THE PROACTIVE APPROACH

blog article

Feb 28, 2019

An endpoint is any device that is connected to the network and has two-way communication with the network. This could include laptops, desktops, and special purpose systems like Point of Sale (POS) terminals, ATMs, ticket counters, kiosks, and servers. Until a few years ago, attackers breached the p...

Read More

Lock the Front Door with Proofpoint LOCK THE FRONT DOOR WITH PROOFPOINT'S EMAIL FRAUD DEFENSE

blog article

Feb 28, 2019

Setting aside those of us who grew up in small towns during simpler times, nearly everyone locks their front door these days. It's not even a question. If you have a lock on your door, you use it. Does it stop a determined burglar from breaking into your house? Nope. In fact, most houses have wi...

Read More

Do You Know How Viruses And Malware Get Into Your PC? DO YOU KNOW HOW VIRUSES AND MALWARE GET INTO YOUR PC?

blog article

Feb 28, 2019

Did you know, there are countless ways through which viruses can enter your laptops and computers? Viruses and malware are types of malicious software specially designed by cyber crooks to infect your computers. These malicious software spreads from one system to another and can wipe away all your l...

Read More

The Cyber Security Platform Shift – More Secure, Less Complex THE CYBER SECURITY PLATFORM SHIFT – MORE SECURE, LESS COMPLEX

blog article

Feb 27, 2019

How Integrated Cyber Defense reduces the integration burden on customers in a fast-changing security world. The cyber security world is undergoing dramatic shifts and the changes are coming fast and furious. Our increasingly mobile and cloud-centric era imposes new burdens on security leaders. But t...

Read More

Is Blockchain the Answer to Healthcare Data Breaches? IS BLOCKCHAIN THE ANSWER TO HEALTHCARE DATA BREACHES?

blog article

Feb 27, 2019

Healthcare breaches pose a major problem for doctors, patients, and entire medical and insurance systems, exposing confidential patient information and leaving responsible parties vulnerable to lawsuits – and worst of all, these breaches are increasingly common. It raises the question: what ca...

Read More

Cybersecurity culture instead of dull lectures CYBERSECURITY CULTURE INSTEAD OF DULL LECTURES

blog article

Feb 26, 2019

When we talk about practical advice for companies, we always say something like “Raise your employees’ security awareness.” That advice is unquestionably strong, but we have noticed that not everybody understands the term security awareness in quite the same way. We would like to e...

Read More

Choosing the best antivirus for your Android phone CHOOSING THE BEST ANTIVIRUS FOR YOUR ANDROID PHONE

blog article

Feb 26, 2019

How to choose an antivirus app for your Android phone or tablet. Nowadays, mobile security suites have a lot of features, and their functionality goes far beyond just antivirus. But still, antivirus is a very important part of each and every Internet security suite. What makes antivirus good or bad?...

Read More

Can a Managed Security Service Provider Help You? CAN A MANAGED SECURITY SERVICE PROVIDER HELP YOU?

blog article

Feb 26, 2019

A managed security service provider, or MSSP, is an entity—usually an organization consisting of many cybersecurity experts—that provides a variety of services designed to protect organizations against cyber threats. However, many companies question whether an MSSP can help them, or if t...

Read More

Oil & Gas Cybersecurity and Process Safety Converge Thanks to TRITON OIL & GAS CYBERSECURITY AND PROCESS SAFETY CONVERGE THANKS TO TRITON

blog article

Feb 26, 2019

In 2017, a Middle Eastern petrochemical facility had the unfortunate distinction of being the first known victim of malware specifically targeted at process safety systems. Thanks to TRITON, the oil and gas industry became ground zero for the convergence of SIS process safety and ICS cybersecurity. ...

Read More

3 Things You’re Responsible for in the Age of the Growing Attack Surface 3 THINGS YOU’RE RESPONSIBLE FOR IN THE AGE OF THE GROWING ATTACK SURFACE

blog article

Feb 26, 2019

The days are long gone when cybersecurity simply involved watching your internal networks behind the firewall. As businesses grow online and in the cloud in the name of innovation, their attack surface has exploded. Although the increasingly sophisticated online landscape puts more powerful tools in...

Read More

Cybersecurity challenges in a digitally transforming world CYBERSECURITY CHALLENGES IN A DIGITALLY TRANSFORMING WORLD

blog article

Feb 26, 2019

Say the word “cybersecurity,” and most of us immediately think of viruses infecting our computers, ransomware that demands a fee to decrypt our data, and hackers working to penetrate a network to steal data. Indeed, these kinds of attacks cause serious damage and take up a lot of securit...

Read More

France’s New Offensive Cyber Doctrine FRANCE’S NEW OFFENSIVE CYBER DOCTRINE

blog article

Feb 26, 2019

Since its November 2018 announcement of the Paris Call, a code of conduct for cyber space, France has turned to the offensive. On Jan. 18, French armed forces minister Florence Parly unveiled the country’s first doctrine for offensive cyber operations. This announcement is the latest in a seri...

Read More

Apple Users May Lose Face With New FaceTime Bug APPLE USERS MAY LOSE FACE WITH NEW FACETIME BUG

blog article

Feb 26, 2019

Apple users are targeted again this week. An unpleasant bug was reported by 9to5Mac that may allow someone calling on FaceTime to hear conversations and even see video with the call recipient not even realizing it’s happening. It affects those with any iPhone running on versions 12.1 and above...

Read More

Average US Data Breach Cost $3.8 Million – Up 6.4% AVERAGE US DATA BREACH COST $3.8 MILLION – UP 6.4%

blog article

Feb 25, 2019

Not only is the cost of business going up, but the cost of preventing a data breach in the U.S. is going up with it. The “2018 Cost of a Data Breach Study” by Ponemon for IBM finds startling facts and figures on data breaches. The U.S. currently pays the highest price for a breach, avera...

Read More

Proofpoint Completes FIPS 140-2 Validation Process for Encryption PROOFPOINT COMPLETES FIPS 140-2 VALIDATION PROCESS FOR ENCRYPTION

blog article

Feb 25, 2019

The growing emphasis on encryption in the U.S. federal government and other regulated industries led Proofpoint to partner with SafeLogic to pursue FIPS 140-2 validation for cryptographic modules. After proving conformance with the FIPS 140-2 standard through a series of tests, conducted by an indep...

Read More

6 WAYS CYBERATTACKERS DEFEAT 2FA AND WHAT YOU CAN DO ABOUT IT 6 WAYS CYBERATTACKERS DEFEAT 2FA AND WHAT YOU CAN DO ABOUT IT

blog article

Feb 25, 2019

As an industry it is crucial that we implement more security controls around access points than just 2FA. Using behind-the-scenes risk checks – including device, location, IP address, account type, and behavior – you can elevate identity trust and stop attackers from bypassing 2FA, even ...

Read More

Most common cybersecurity threats that occur in the healthcare sector MOST COMMON CYBERSECURITY THREATS THAT OCCUR IN THE HEALTHCARE SECTOR

blog article

Feb 25, 2019

While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be dangerous and life-threatening – imagine critical care patients being lo...

Read More

Data Privacy and GDPR for OEM partnerships DATA PRIVACY AND GDPR FOR OEM PARTNERSHIPS

blog article

Feb 25, 2019

The EU General Data Protection Regulation (GDPR) applies to a ‘company’[1] whenever the personal information of people within the European Union  is present in a company’s data and IT systems. Consequently, GDPR has had a transformative effect on the way companies manage and s...

Read More

Why Cybersecurity Experts Are Being Recruited Left and Right WHY CYBERSECURITY EXPERTS ARE BEING RECRUITED LEFT AND RIGHT

blog article

Feb 25, 2019

Once upon a time, businesses needed to take light cybersecurity precautions to ward off amateur hackers. A business owner may have recruited their tech-savvy nephew to protect their system, barely worrying about the risk. Today, the world of cybersecurity has done a 180 — it’s now a top ...

Read More

3 Security Tips for Small Banks and Credit Unions 3 SECURITY TIPS FOR SMALL BANKS AND CREDIT UNIONS

blog article

Feb 22, 2019

The financial sector is bombarded with malicious files designed to infiltrate networks at a rate far higher than the average across all industries, according to a report by the cybersecurity firm Lastline. One in every 340 web or email transactions contained malicious files, higher than the average ...

Read More

Cybersecurity Predictions for 2019 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Feb 22, 2019

Another year is here. 2019 has just started and it is likely to shape up to be an eventful year for cybersecurity. Last year, in our 2018 predictions, we analyzed the year ahead and shortlisted various cybersecurity trends which we thought would play a major part in 2018 – these included threa...

Read More

The lazy person’s guide to cybersecurity: minimum effort for maximum protection THE LAZY PERSON’S GUIDE TO CYBERSECURITY: MINIMUM EFFORT FOR MAXIMUM PROTECTION

blog article

Feb 22, 2019

Are you tired of that acquaintance who keeps bugging you with computer questions? Do you avoid visiting certain people because you know you will spend most of the evening cleaning up their machine? My uncle Bob is one of those people. He’s a nice guy, but with computers, he’s not just an...

Read More

CIS Control 1: The Beginning of Basic Cybersecurity CIS CONTROL 1: THE BEGINNING OF BASIC CYBERSECURITY

blog article

Feb 22, 2019

The CIS Critical Controls were developed as a framework to not only ensure the successful realization of basic cybersecurity hygiene, but to lead to the planning and implementation of a robust security protocol. To build any cybersecurity protection schemata, it is necessary to know the extent of wh...

Read More

Root Cause Analysis: Finding Patient Zero During Cybersecurity Incident Response Investigations ROOT CAUSE ANALYSIS: FINDING PATIENT ZERO DURING CYBERSECURITY INCIDENT RESPONSE INVESTIGATIONS

blog article

Feb 21, 2019

In Q1, we released new tools to assist cybersecurity incident responders. One of those new features is a root cause analysis tool, is designed to help IR teams trace the source of suspicious activity or identified threats across their environment. This blog introduces the new root cause analysis (RC...

Read More

How does macOS protect against malware? HOW DOES MACOS PROTECT AGAINST MALWARE?

blog article

Feb 21, 2019

Mac users often are told that “Macs don’t get viruses.” This is not really true, of course. Macs can and do get infected. However, it is true that macOS provides some basic protection against malware. This protection can be quite effective in some ways, but, unfortunately, quite in...

Read More

The New Breed of “Fileless Malware” and How It Can Be Stopped with Behavioral Analytics and Machine Learning THE NEW BREED OF “FILELESS MALWARE” AND HOW IT CAN BE STOPPED WITH BEHAVIORAL ANALYTICS AND MACHINE LEARNING

blog article

Feb 21, 2019

A new genus of malware has emerged that breaks the rules of traditional detection and defense methods. Unlike other breeds of malware that require the installation of software on a victim’s machine, fileless malware infects a host computer’s dynamic memory, or RAM. Fileless malware attac...

Read More

UNLEASHING THE TRUE POTENTIAL OF MITRE ATT&CK- CREATING AN ADVERSARY EMULATION PLAN WITH THE MITRE ATT&CK FRAMEWORK UNLEASHING THE TRUE POTENTIAL OF MITRE ATT&CK- CREATING AN ADVERSARY EMULATION PLAN WITH THE MITRE ATT&CK FRAMEWORK

blog article

Feb 21, 2019

Many different security frameworks exist in the world today: ISO-17799, it’s successor ISO-27000, Cobit, NIST, and others. The latest introduction, the MITRE ATT&CK framework, is giving a new perspective on the tactical needs of security operations.  Developing a solid, closed-loop de...

Read More

Outdated Health IT Infrastructure Attracts Hackers to Hospitals OUTDATED HEALTH IT INFRASTRUCTURE ATTRACTS HACKERS TO HOSPITALS

blog article

Feb 21, 2019

Outdated healthcare IT infrastructure is attracting cybercriminals to hospitals, which are the most vulnerable type of organization, judged a new cybersecurity report. Other factors attracting cybercriminals to healthcare include lack of experienced cyber personnel, highly valuable data, and vulnera...

Read More

Machine Learning is Shifting the Power Back to the Infosec Community MACHINE LEARNING IS SHIFTING THE POWER BACK TO THE INFOSEC COMMUNITY

blog article

Feb 21, 2019

In the age of internet-scale threats, automation has been the weapon of choice for cybercriminals, who are pulling off data breaches at an unprecedented rate. But in the hands of the good guys, who are tirelessly collecting internet data they use to train the machine-learning models that uncover the...

Read More

What Makes It So Important To Constantly Update Your Antivirus Software WHAT MAKES IT SO IMPORTANT TO CONSTANTLY UPDATE YOUR ANTIVIRUS SOFTWARE

blog article

Feb 21, 2019

Are you using well-developed security software to protect yourself from cyber threats? If you answered no to this question, it’s time to download the best antivirus software. Having reliable antivirus software installed can create a world of difference between the life and death of your PC. Wi...

Read More

Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware HACKERS USE FAKE GOOGLE RECAPTCHA TO CLOAK BANKING MALWARE

blog article

Feb 21, 2019

The most effective phishing and malware campaigns usually employ one of the following two age-old social engineering techniques: Impersonation. These online phishing campaigns impersonate a popular brand or product through specially crafted emails, SMS, or social media networks. These campaigns empl...

Read More

2018 Holiday Shopping Season Cyber Threat Activity: A Snapshot 2018 HOLIDAY SHOPPING SEASON CYBER THREAT ACTIVITY: A SNAPSHOT

blog article

Feb 20, 2019

The 2018 holiday shopping season was a boon for retailers, but cyber threat actors filled their pockets, too. As businesses innovate by expanding their online presence and migrating to the cloud, their digital footprints grow tenfold. This footprint, a collection of far-flung, client-facing assets o...

Read More

First Hacker Convicted of FIRST HACKER CONVICTED OF 'SIM SWAPPING' ATTACK GETS 10 YEARS IN PRISON

blog article

Feb 20, 2019

A 20-year-old college student who stole cryptocurrency worth more than $5 million by hijacking victims' phone numbers has pleaded guilty and accepted a sentence of 10 years in prison. Ortiz was arrested last year on charges of siphoning millions of dollars in cryptocurrency from around 40 victim...

Read More

New steps to protect Europe from continued cyber threats NEW STEPS TO PROTECT EUROPE FROM CONTINUED CYBER THREATS

blog article

Feb 20, 2019

Soon millions of Europeans will head to the polls to cast their ballots in the European Parliament elections, as well as several key national elections. We believe it’s critical that organizations underpinning the democratic process have access to state-of-the-art cybersecurity protection as w...

Read More

A Game of Risk with Broadcasters, Cyber Felons and Dragons A GAME OF RISK WITH BROADCASTERS, CYBER FELONS AND DRAGONS

blog article

Feb 20, 2019

Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes defined by their fiery prowess – boast...

Read More

Mitigating Security Threats with MITRE ATT&CK MITIGATING SECURITY THREATS WITH MITRE ATT&CK

blog article

Feb 20, 2019

In a previous blog post I explained MITRE ATT&CK and the primary ways organizations might use it to improve their security. As a refresher, the MITRE ATT&CK framework, model, and taxonomy provide a categorized and structured catalog of tactics (the “why” of an attack) and techniq...

Read More

Sophisticated phishing: a roundup of noteworthy campaigns SOPHISTICATED PHISHING: A ROUNDUP OF NOTEWORTHY CAMPAIGNS

blog article

Feb 20, 2019

Phishing is a problem nearly as old as the Internet. Yet, criminals continue to reach into their bag of phishing tricks in 2019 because, in a nutshell, it just works. Dialing into the human psyche and capitalizing on emotions such as fear, anxiety, or plain laziness, phishing attacks are successful ...

Read More

Which Endpoint Security Tools Are Right for Your Needs? WHICH ENDPOINT SECURITY TOOLS ARE RIGHT FOR YOUR NEEDS?

blog article

Feb 19, 2019

While cybersecurity is not a device, it is dependent on having the right security tools in place to protect the network. Endpoint security tools are a critical part of any organization’s network security strategy. Having strong device protection helps to counteract intrusion attempts by impedi...

Read More

PASSWORD CYCLING VERSUS RECYCLING: ONE IS A CYBERSECURITY BEST PRACTICE, THE OTHER, A TABOO PASSWORD CYCLING VERSUS RECYCLING: ONE IS A CYBERSECURITY BEST PRACTICE, THE OTHER, A TABOO

blog article

Feb 19, 2019

Are you a cybersecurity recycler? In the last few decades, we’ve learned some very hard lessons about recycling. Having “disposable” everything is not good for the environment, economy, or posterity. We all need to learn how to correctly recycle, reuse, repurpose, and dispose of ma...

Read More

What is Ransomware and Ransomware Incident Response? WHAT IS RANSOMWARE AND RANSOMWARE INCIDENT RESPONSE?

blog article

Feb 19, 2019

Ransomware is a form of malicious computer malware, that hijacks a device and blocks direct access to it until the victim decides to pay a certain amount of money (ransom) asked for by the creator. This type of attack has seen a huge spike in recent times, partially due to the huge impact ransomware...

Read More

Why blockchain may be blockchain’s best cybersecurity option WHY BLOCKCHAIN MAY BE BLOCKCHAIN’S BEST CYBERSECURITY OPTION

blog article

Feb 19, 2019

One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousand...

Read More

6 Tips to Improve SharePoint Security 6 TIPS TO IMPROVE SHAREPOINT SECURITY

blog article

Feb 19, 2019

Historically, security was the job of IT administrators alone. With SharePoint, however, comes a significant paradigm shift: Ensuring SharePoint security is a joint responsibility shared by IT and end users. SharePoint is one of the most popular platforms for collaborative working and sharing of con...

Read More

WHY AUTOMATED HOMES NEED STRONGER CYBER SECURITY WHY AUTOMATED HOMES NEED STRONGER CYBER SECURITY

blog article

Feb 19, 2019

If you explained the concept of an automated home to somebody 15 years ago, they would have thought you were describing the plot of a science fiction movie. However, connected devices are everywhere today. Research from Statista shows the total number of smart homes in the U.S. is expected to reach ...

Read More

How Android malware scanner protects your phone or tablet? HOW ANDROID MALWARE SCANNER PROTECTS YOUR PHONE OR TABLET?

blog article

Feb 19, 2019

Of late, it is widely noticed that mobile devices are targeted by online criminals and maybe your device too could be at grave danger. A free Android malware scanner in place can reveal such things before its late. However, there are a few things that the owner of the mobile device needs to do to st...

Read More

FAQ: Reporting Data Privacy Obligations to the Board FAQ: REPORTING DATA PRIVACY OBLIGATIONS TO THE BOARD

blog article

Feb 19, 2019

A Practical Approach to Ongoing Compliance. In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game ...

Read More

The Business Case for Security Services THE BUSINESS CASE FOR SECURITY SERVICES

blog article

Feb 18, 2019

Managed service providers not yet offering managed security should certainly consider the pros and cons of a security monitoring service prior to investing in the tools and people. However, the small to mid-sized market is crying out for cost-effective managed security, since getting it right with t...

Read More

Get your Board of Directors on Board with Cyber Security GET YOUR BOARD OF DIRECTORS ON BOARD WITH CYBER SECURITY

blog article

Feb 18, 2019

It’s very easy for Board members and C-suite executives to reduce or cut cyber security budgets, but that makes their organization more susceptible to a cyber-attack. The reality is, is that cyber security is intangible and difficult to justify the return on the cost (ROI) of security measures...

Read More

How are social networking accounts used for malicious purposes? HOW ARE SOCIAL NETWORKING ACCOUNTS USED FOR MALICIOUS PURPOSES?

blog article

Feb 18, 2019

Close to 3 billion. No, that’s not the population of a country. According to a recent estimate, that will be the total number of users globally on social media. The popularity of this phenomenon called social media can aptly be summed up by just that statistic alone. Social media is everywhere...

Read More

Crack hunting: not all it’s cracked up to be CRACK HUNTING: NOT ALL IT’S CRACKED UP TO BE

blog article

Feb 18, 2019

People sometimes ask us in the forums if a keygen or software crack is safe to use. Sometimes, these programs do what they say on the tin. Other times, they’re not what they say they are. In this post, I’ll describe what happened when I went crack hunting, and why it is often unsafe to c...

Read More

MOST NOTORIOUS CYBER ATTACKS OF 2018 MOST NOTORIOUS CYBER ATTACKS OF 2018

blog article

Feb 17, 2019

The number of cyberattacks has been increasing every year and the count is endless. The types of cyberattacks are unique and independent without or least similarity of previous footprints. From individual’s personal information to crucial organization data, everything is at stake of the hacker...

Read More

Data Breaches: What Do the Numbers Mean? DATA BREACHES: WHAT DO THE NUMBERS MEAN?

blog article

Feb 17, 2019

Risk Based Security came out with their annual data breach report this past week. Overall, 2018 brought the second-highest number of reported data breaches of any year on record. “It’s been an unusual year for breach activity,” commented Inga Goddijn, executive vice president of Ri...

Read More

Spoofing in the reeds with Rietspoof SPOOFING IN THE REEDS WITH RIETSPOOF

blog article

Feb 16, 2019

We’re tracking a new cyberthreat that combines file formats to create a more versatile malware. Since August 2018, we have been monitoring a new malware family we’re calling Rietspoof.  Rietspoof is a new multi-stage malware that exhibits some very striking features and capabilities...

Read More

Cybersecurity 101: What You Need To Know About False Positives and False Negatives CYBERSECURITY 101: WHAT YOU NEED TO KNOW ABOUT FALSE POSITIVES AND FALSE NEGATIVES

blog article

Feb 16, 2019

An Overview of False Positives and False Negatives. Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security. Why? Investigating false positives is a waste of time/resources and d...

Read More

Social Engineering Attacks by the Numbers: Prevalence, Costs, & Impact SOCIAL ENGINEERING ATTACKS BY THE NUMBERS: PREVALENCE, COSTS, & IMPACT

blog article

Feb 15, 2019

Social engineering attacks are not as rare as you think. In fact, you might already be a victim – you just don’t know it yet. Social engineering works because people are almost always the weakest link in information security. We sometimes do not think about the things we do, or are in a ...

Read More

A cyber security health check for the most vulnerable A CYBER SECURITY HEALTH CHECK FOR THE MOST VULNERABLE

blog article

Feb 15, 2019

Who’s most at risk? Having covered the start-up vs corporate question before, we thought we would look into which industry is currently most at risk of cyber attack. According to the Wikipedia entry ‘list of data breaches’, which contains a list of data breaches (spoilers), out of ...

Read More

NEW SCAMS ALERT NEW SCAMS ALERT

blog article

Feb 15, 2019

Tesco are warning customers not to fall for latest text message scam. The text message, under the alias of supermarket giant Tesco, is targeting victims by using their name and car registration plates to ultimately cause damage and steal confidential information. The message, which comprises of thre...

Read More

GandCrab Riding Emotet’s Bus GANDCRAB RIDING EMOTET’S BUS

blog article

Feb 15, 2019

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes frequently in intervals with different techniques ...

Read More

What Is CompTIA Security+? WHAT IS COMPTIA SECURITY+?

blog article

Feb 14, 2019

Cybersecurity is an increasingly pressing concern for organizations across all sectors. If you’re looking to further your career in cybersecurity or switch into a more security-centric role, the CompTIA Security+ certification might be perfect for you. In this blog, you’ll find a detaile...

Read More

Want to Secure Your Endpoints? Go Beyond the Endpoint WANT TO SECURE YOUR ENDPOINTS? GO BEYOND THE ENDPOINT

blog article

Feb 14, 2019

Traditional endpoint security control has always been about malware, threat analysis, and remediation. However, even the most pristine and clear endpoint will continue to become polluted after cleanup if the overall protection solution fails to take into consideration the context of its environment....

Read More

7 WAYS TO SECURE YOUR BUSINESS WI-FI NETWORK 7 WAYS TO SECURE YOUR BUSINESS WI-FI NETWORK

blog article

Feb 14, 2019

Almost every business uses Wi-Fi in some way or another. Whether it’s to access email via the Internet or process payments, Wi-Fi plays a fundamental role in today’s business operations. However, this creates an opening for cyber criminals to seek out unsecure networks and steal valuable...

Read More

Fighting Back Against Phishing: A Workplace Concern FIGHTING BACK AGAINST PHISHING: A WORKPLACE CONCERN

blog article

Feb 14, 2019

Is someone phishing in your inbox? It’s more likely than you think. Phishing attacks are common online attacks that aim to steal useful information, from account credentials to personal data. Unlike traditional hacking, though, what sets phishing apart is its personal nature – the person...

Read More

The Best Way to Land that Next Cyber Opportunity THE BEST WAY TO LAND THAT NEXT CYBER OPPORTUNITY

blog article

Feb 14, 2019

Guest Blog by Kersley Joseph, CyberVista Instructor. You completed your cert. You think it might be time to jump ship. How do you go about landing your new opportunity convincingly? Is a certification enough? Is it all about experience and/or technology? Where should you focus your efforts to increa...

Read More

Bad Rabbit – What you need to know about this ransomware and its prevention? BAD RABBIT – WHAT YOU NEED TO KNOW ABOUT THIS RANSOMWARE AND ITS PREVENTION?

blog article

Feb 14, 2019

Ransomware is a malicious software, that secretly downloads on to a computer and warns the user to delete or revoke access to their data. When the hacker has full control of the computer or network, they demand a ransom normally through cryptocurrency to restore the access to the files. Of late, the...

Read More

Top Lessons from the Network Security Mistakes of 2018 TOP LESSONS FROM THE NETWORK SECURITY MISTAKES OF 2018

blog article

Feb 14, 2019

Every year, cybersecurity experts look at the previous year’s network security mistakes—the ones that resulted in massive data breaches and made headlines—to learn what went wrong and how those cybersecurity mistakes could be avoided in the future. 2018 was yet another year in a lo...

Read More

Defending Against Ransomware: Prevention, Protection, Removal DEFENDING AGAINST RANSOMWARE: PREVENTION, PROTECTION, REMOVAL

blog article

Feb 14, 2019

A ransomware attack can be crippling for an organization. During an attack, cybercriminals will block access to your files or network, claiming that if you pay a ransom fee, your access will be restored. An effective ransomware defense strategy is essential to prevent extensive damage and must inclu...

Read More

Types of Phishing Attacks TYPES OF PHISHING ATTACKS

blog article

Feb 13, 2019

Phishing is a social engineering tactic in which an attacker attempts to gain personal data from victims by going undercover as a trusted source whether through an email or a phone call. Users are tricked into giving up their information. The goal of a phishing attack can vary; however, attackers us...

Read More

Improved cybersecurity a 2019 resolution you can actually keep IMPROVED CYBERSECURITY A 2019 RESOLUTION YOU CAN ACTUALLY KEEP

blog article

Feb 13, 2019

Did you make a New Year’s resolution or 2019? While many people set ambitious goals each January – from losing weight to reading more books – most don’t even come close to reaching them. According to U.S. News, 80 percent of people have abandoned their resolutions by the seco...

Read More

What is Cybersecurity and What does it mean for you? WHAT IS CYBERSECURITY AND WHAT DOES IT MEAN FOR YOU?

blog article

Feb 13, 2019

With the breadth of news coverage around blockchain, hacking scandals, and data integrity, an average person polled on the street is likely to have at least a basic sense of cybersecurity, as a concept if not by name. The idea of cybersecurity is omnipresent; we know it exists, and we know it matter...

Read More

What is Swen Virus? WHAT IS SWEN VIRUS?

blog article

Feb 12, 2019

Swen is a malicious program that replicates and spreads on its own, it is technically classified as a worm virus. Swen does not require any human aid to replicate and circulate not only inside a computer but also to other computers connected to the network. The Swen worm is considered greatly danger...

Read More

6 REASONS WHY CYBER THREAT INTELLIGENCE MATTERS (AND HOW CTIA HELPS) 6 REASONS WHY CYBER THREAT INTELLIGENCE MATTERS (AND HOW CTIA HELPS)

blog article

Feb 12, 2019

In today’s technologically developed and evolved world, individuals and organizations alike are constantly connected to the internet to carry out all manner of personal and financial transactions. The internet has become so handy that criminals take advantage of our constant connectivity to st...

Read More

Champions of Health and Cybersecurity Unite at HIMSS 2019 CHAMPIONS OF HEALTH AND CYBERSECURITY UNITE AT HIMSS 2019

blog article

Feb 12, 2019

Today is the first full day of HIMSS 2019 – the world’s largest health information and technology conference – and we’ve just arrived in sunny Orlando, Florida, joining more than 45,000 healthcare professionals from across 90+ countries. This year, HIMSS is emphasizing cyber ...

Read More

A GDPR Update A GDPR UPDATE

blog article

Feb 12, 2019

It’s been nine months since May 25, 2018 when the General Data Protection Regulation (GDPR) went into effect in the European Union (EU). During this short period of time much has happened, including megabreaches that continue to occur throughout the world. The first GDPR enforcement actions ar...

Read More

Important Features Of A Good Antivirus Software IMPORTANT FEATURES OF A GOOD ANTIVIRUS SOFTWARE

blog article

Feb 12, 2019

Since everyone from consumers to businesses has started using the internet for almost every single task, reliable antivirus software has become a necessity to ensure that you are safe online and offline. What is Antivirus? Antivirus software is a type of go-to solution developed and designed to prot...

Read More

Does Your Small Business Need Cyber Insurance? DOES YOUR SMALL BUSINESS NEED CYBER INSURANCE?

blog article

Feb 11, 2019

Most businesses invest in physical security and general liability insurance, but cybersecurity is usually limited to a firewall and some antivirus software. Unfortunately, this leaves many small businesses exposed to the high cost of cyber attacks — which are increasing in frequency. According...

Read More

A Call to Diversify the Cybersecurity Workforce A CALL TO DIVERSIFY THE CYBERSECURITY WORKFORCE

blog article

Feb 11, 2019

You’ve read about it, know it well, and can probably instantaneously identify one of today’s top cyber crises: the cybersecurity skills gap. It’s putting enterprises, governments and academic institutions at greater risk than ever because we don’t have enough professionals to...

Read More

Enhancing cyber threat protection in Microsoft Office 365 ENHANCING CYBER THREAT PROTECTION IN MICROSOFT OFFICE 365

blog article

Feb 11, 2019

In our last blog, we explored the risk of receiving sensitive data unauthorized via email, the sharing sensitive information internally across departments, and the need for advanced data protection features within both on-premise email systems and Microsoft Office 365 (MO365) environments to mitigat...

Read More

Three Use Cases For Proactive Threat Hunting and Detection Within Healthcare Organizations THREE USE CASES FOR PROACTIVE THREAT HUNTING AND DETECTION WITHIN HEALTHCARE ORGANIZATIONS

blog article

Feb 08, 2019

Cyber attacks are evolving so rapidly that security teams are struggling to integrate and operationalize security tools that apply to only one area of the protection model. Malware Hunting (threat hunting) for example is becoming a necessity in today’s enterprise IT environments — especi...

Read More

Internet Security: Most Important Tips For Students To Stay Safe Online INTERNET SECURITY: MOST IMPORTANT TIPS FOR STUDENTS TO STAY SAFE ONLINE

blog article

Feb 08, 2019

This is a digital era and students today are able to access more information than ever before in the past. Nearly every college and school student is equipped with a laptop, mobile phone, tablet, personal computer, and other smart gadgets. While technology brings a wealth of information that makes o...

Read More

Understanding Digital Risk Protection UNDERSTANDING DIGITAL RISK PROTECTION

blog article

Feb 08, 2019

There has been a lot of talk recently about Digital Risk and Digital Risk Protection. Forrester published their 2018 New Wave on Digital Risk Protection (you can download a copy here). However, Digital Risk is not a new topic; it’s been around since at least 2010. This blog outlines the key el...

Read More

What’s in a Modern Attack Surface? RiskIQ Research Has the Answer WHAT’S IN A MODERN ATTACK SURFACE? RISKIQ RESEARCH HAS THE ANSWER

blog article

Feb 08, 2019

To keep up with the breakneck speed of modern business, organizations are moving customer and partner interactions online. Unfortunately, increased risk of cyber attack and the associated consequences like data theft, operational disruption, brand erosion, and employee and customer compromise have b...

Read More

Proofpoint Recognized as One of the Fastest Growing Apps in Okta’s Businesses @ Work 2019 Report PROOFPOINT RECOGNIZED AS ONE OF THE FASTEST GROWING APPS IN OKTA’S BUSINESSES @ WORK 2019 REPORT

blog article

Feb 07, 2019

Okta, an independent provider of identity for the enterprise, recently recognized Proofpoint as one of the fastest growing apps available within Okta’s network of 5,500+ pre-built integrations with cloud and on-premises systems. Based on data from more than 5,600 Okta customers, Proofpoint&rsq...

Read More

5 TOP TIPS TO KEEP YOUR RETAIL STORE SECURE 5 TOP TIPS TO KEEP YOUR RETAIL STORE SECURE

blog article

Feb 07, 2019

For every $1 billion in sales, retailers lose $777,877 as a result of retail crime. Whether it’s employee theft, fraud or shoplifting, retail crime impacts profit margins and puts employees and consumers at risk. To enhance security inside your store, we’ve compiled five top retail secur...

Read More

MSP Security Services: The Importance of Incident Response MSP SECURITY SERVICES: THE IMPORTANCE OF INCIDENT RESPONSE

blog article

Feb 07, 2019

If you are an MSP you will already provide incident management, even if it’s not specifically related to or labelled security incident management; it is a basic process in the IT Infrastructure Library (ITIL), defined as the process for detecting, logging, recording and resolving incidents. It...

Read More

28 Fake Apps removed from Google Play Store post Quick Heal Security Lab reports 28 FAKE APPS REMOVED FROM GOOGLE PLAY STORE POST QUICK HEAL SECURITY LAB REPORTS

blog article

Feb 07, 2019

Quick Heal Security Lab has spotted 28 Fake Apps with over 48,000+ (all together) installations on Google Play Store. Google play has removed a total of 28 fake apps from the Play Store after reports by Quick Heal Security Lab. The apps do not have any legitimate functionality related to App name. A...

Read More

Is Your IaaS Provider Responsible for Data Breaches in the Cloud? IS YOUR IAAS PROVIDER RESPONSIBLE FOR DATA BREACHES IN THE CLOUD?

blog article

Feb 07, 2019

To keep up with competitors and the pace of modern consumers, businesses need to continuously expand and upgrade their computing resources. Whether these resources are used to manage online transactions, deliver digital resources, control customer-facing apps, or simply provide employees with access...

Read More

Cyber-security trends to look out for this year CYBER-SECURITY TRENDS TO LOOK OUT FOR THIS YEAR

blog article

Feb 07, 2019

From a cyber-security perspective, last year was certainly eventful! In May, GDPR finally came into effect in Europe, a move that demonstrated how governing bodies are finally getting serious about protecting its citizens’ personal data. Suddenly, organisations who operate in Europe are faced ...

Read More

The Top Tactics to Be Successful at Secure DevOps THE TOP TACTICS TO BE SUCCESSFUL AT SECURE DEVOPS

blog article

Feb 07, 2019

Today’s increasingly connected world, with access to mobile devices and cloud scale computing, is leading to disruption in business models and processes. To succeed, you have no option but to continuously deliver new value to customers at the increasing speed that they demand. Mark Andreessen,...

Read More

Google Chrome extension warns if your password has been leaked GOOGLE CHROME EXTENSION WARNS IF YOUR PASSWORD HAS BEEN LEAKED

blog article

Feb 07, 2019

Anyone who has a presence on the internet is likely to be suffering from breach fatigue. Data leaks are reported in the headlines on a daily basis, and users can feel so overwhelmed by the sheer number of breaches that they feel there’s little they can do to keep ahead of hackers. It can almos...

Read More

SamSam Ransomware: Definition and Prevention SAMSAM RANSOMWARE: DEFINITION AND PREVENTION

blog article

Feb 07, 2019

What is SamSam Ransomware? SamSam is a blend of malware and ransomware because the key objective of the cybercriminal behind SamSam is to get in into an organization. After getting in, it waits and gathers a lot of data. In the meantime, the cybercriminal gains access to systems and then copies the ...

Read More

Bitdefender Smart Home Security places our cyber-security specialists at your disposal BITDEFENDER SMART HOME SECURITY PLACES OUR CYBER-SECURITY SPECIALISTS AT YOUR DISPOSAL

blog article

Feb 07, 2019

Protecting IoT devices is not just an option; it’s a necessity. Smart fridges, washing machines, coffee pots, light bulbs, garage locks, toys, baby monitors – you may have at least one of these. The more popular smart gadgets become, the more hackers are tempted to attack them or use the...

Read More

Here Comes 5G—What are the Data Security Implications? HERE COMES 5G—WHAT ARE THE DATA SECURITY IMPLICATIONS?

blog article

Feb 07, 2019

Organizations and consumers alike are eagerly anticipating the arrival of 5G, the latest generation of cellular mobile communications. But perhaps IT and security executives need to be thinking about the potential security implications. This latest iteration of communications technology is designed ...

Read More

The Truth Behind Voter Registration Data Found on the Darknet THE TRUTH BEHIND VOTER REGISTRATION DATA FOUND ON THE DARKNET

blog article

Feb 07, 2019

Very few would argue that recent headlines concerning election security haven’t been alarming. From hacking to voting systems to stolen voter registration data and the deliberate distribution of false candidate information, it’s no wonder people are questioning the integrity of election ...

Read More

Cybersecurity: Billions Pour In, Basics Languish CYBERSECURITY: BILLIONS POUR IN, BASICS LANGUISH

blog article

Feb 06, 2019

2018’s headlines only underscored the need for robust data security. As if to add a whopping exclamation point to the end of the year, the massive Marriott/Starwood Resorts data breach (announced in November) saw an estimated 327-500 million records compromised. With the relentless parade of b...

Read More

Twenty-Two Million Dollars: Enough Incentive for Cybersecurity? TWENTY-TWO MILLION DOLLARS: ENOUGH INCENTIVE FOR CYBERSECURITY?

blog article

Feb 06, 2019

As 2019 launches, the word cybersecurity is everywhere. There’s security around medical devices, telemedicine, IT systems and, arguably most importantly, portals – which are accessed by employees, vendors, and patients. Cybersecurity is a big focus for providers, a topic that ranked amon...

Read More

What is Penetration Testing? WHAT IS PENETRATION TESTING?

blog article

Feb 06, 2019

Penetration testing is an interesting subsection of cyber security. Where many areas of cyber security focus on defending networks, penetration testing is entirely about a pen tester breaking into networks and showing how they did it. The discipline is one of the most difficult paths to follow in th...

Read More

The Origins of Web Security and the Birth of Security Socket Layer (SSL) Protocol THE ORIGINS OF WEB SECURITY AND THE BIRTH OF SECURITY SOCKET LAYER (SSL) PROTOCOL

blog article

Feb 06, 2019

As people who live and breathe cybersecurity, at Exabeam we’re naturally fascinated by its history. In fact, we built a History of Cybersecurity 2019 Calendar to share our research. Each month features dates when significant events in cybersecurity occurred. This is the second blog in a series...

Read More

HOW TO SECURE THE CLOUD HOW TO SECURE THE CLOUD

blog article

Feb 06, 2019

The cloud has become a mainstay for many businesses and governments and the revolution is still growing at a very fast pace. This mass migration to the cloud makes platforms that can ensure efficiency, productivity, flexibility, profitability, and agility very attractive. Like every technology, the ...

Read More

620 million Hacked Accounts Put on Sale 620 MILLION HACKED ACCOUNTS PUT ON SALE

blog article

Feb 06, 2019

Details of 620 million accounts were found for sale on the dark web, stolen from 16 different hacked websites. According to The Register, the stolen information was put up on the Tor network site Dream Market cyber-souk. A single hacker stole the account information up for sale. This malicious actor...

Read More

12 Cyber Security Principles from the Experts 12 CYBER SECURITY PRINCIPLES FROM THE EXPERTS

blog article

Feb 06, 2019

Blackpoint Cyber reveals 12 cyber security principles that drive their solution and business. Numerous successful cyber-attacks against even the best funded, most competent organizations demonstrate that current security strategies and solutions are not working. Here at Blackpoint we have a pretty u...

Read More

Update your iOS devices now against the FaceTime eavesdropping bug UPDATE YOUR IOS DEVICES NOW AGAINST THE FACETIME EAVESDROPPING BUG

blog article

Feb 06, 2019

Last week a bug became such big news that it broke out of the technology press, and into the mainstream media – generating headlines around the globe. The reason? A bizarre bug had been discovered in the way iPhones and iPads handled Group FaceTime calls meant that someone could potentially li...

Read More

Security Leadership Series: Don SECURITY LEADERSHIP SERIES: DON'T BE THE ONLY PERSON CARRYING THE MANTLE FOR CYBERSECURITY

blog article

Feb 06, 2019

It’s easy to feel like a lone wolf when you work in cybersecurity (or a lone wolfpack, if you’re part of a cybersecurity team). While the work you do impacts every area of your organization, your day-to-day responsibilities are so different than most other departments that it can be hard...

Read More

5 Cybersecurity Myths to Avoid 5 CYBERSECURITY MYTHS TO AVOID

blog article

Feb 06, 2019

IT Service Management, Incident Management, Vulnerability Management, Compliance, Software as a Service, Security, ransomware, cybersecurity, Phishing. There is a lot of misinformation out there when it comes to cybersecurity.  It can be hard for an organization to know what the right approach ...

Read More

Top 5 Security Tactics To Safeguard Your Business From Phishing Attacks TOP 5 SECURITY TACTICS TO SAFEGUARD YOUR BUSINESS FROM PHISHING ATTACKS

blog article

Feb 06, 2019

Today, more than ever, the threat of phishing attacks and security breaches is on the minds of businesses worldwide. Phishing attacks can be detrimental for businesses, regardless of size or sector. Phishing- a technique used by cyber crooks to trick web users to steal their confidential data, passw...

Read More

4 Reasons to Audit Your Network Security Now 4 REASONS TO AUDIT YOUR NETWORK SECURITY NOW

blog article

Feb 05, 2019

A network security audit can be a crucial tool for helping organizations enhance their cybersecurity. But, not every business is as consistent in performing these audits as they could be—or should be. If you’re looking for reasons to audit your network security to present to others, here...

Read More

6 Security Tips When Trading Online 6 SECURITY TIPS WHEN TRADING ONLINE

blog article

Feb 05, 2019

Online trading is on the rise as many consumers take control of their own investments or work with brokers virtually rather than in person or over the phone. At the same time, cybersecurity attacks are on the rise as hackers also try to take advantage of gaps in the system, stealing identities and e...

Read More

Getting Ready: CompTIA Security+ Practice Test GETTING READY: COMPTIA SECURITY+ PRACTICE TEST

blog article

Feb 05, 2019

CompTIA Security+ is a globally recognized certification that validates the foundational skills and knowledge needed to perform core security functions. The Security+ is vendor-neutral and not role-specific, so it fits well in a range of organizations, regardless of which technologies they use. With...

Read More

5 WAYS TO INGRAIN CYBERSECURITY AWARENESS INTO YOUR BUSINESS 5 WAYS TO INGRAIN CYBERSECURITY AWARENESS INTO YOUR BUSINESS

blog article

Feb 05, 2019

When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security awareness part of that overall approach, this isn’t the case. With security awareness, creating a mission typically equals check...

Read More

3 essential ways to strengthen your business data security 3 ESSENTIAL WAYS TO STRENGTHEN YOUR BUSINESS DATA SECURITY

blog article

Feb 05, 2019

For any business big or small, business data is an asset that they cannot afford to compromise at any cost. With a huge amount of data, from employee details to the credit card details of customers, stored in the form of vulnerable electronic records, the loss of even a single data record can result...

Read More

Home Router or Trojan Horse? HOME ROUTER OR TROJAN HORSE?

blog article

Feb 05, 2019

The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our de...

Read More

Forging fresh cyber security talent FORGING FRESH CYBER SECURITY TALENT

blog article

Feb 05, 2019

Data breaches, smaller or otherwise, are making the headlines increasingly often. Alleged failed Holiday Season deliveries are one of many popular methods cyber criminals use. Scammers would send people phishing emails – which were on fraudsters’ top 10 list for 2018 – or otherwise...

Read More

Is Cybersecurity the Same as Data Privacy? IS CYBERSECURITY THE SAME AS DATA PRIVACY?

blog article

Feb 05, 2019

If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal w...

Read More

The State of our Digital Union: Where the U.S. Stands on Cybersecurity THE STATE OF OUR DIGITAL UNION: WHERE THE U.S. STANDS ON CYBERSECURITY

blog article

Feb 05, 2019

President Donald Trump is set to deliver his second State of the Union address tonight. Millions of Americans will tune in to hear Trump take stock of where our nation stands and lay out an agenda for his next year in office. According to news reports, the president is expected to touch on an array ...

Read More

Cybersecurity Documentation: The Best Defense Is a Good Offense CYBERSECURITY DOCUMENTATION: THE BEST DEFENSE IS A GOOD OFFENSE

blog article

Feb 04, 2019

Most people do not regard their cybersecurity and privacy documentation as a proactive security measure. On the contrary, many oftentimes view documentation as a passive effort that offers little protection to a company, generally an afterthought that must be addressed to appease compliance efforts....

Read More

What to Know About the HITRUST RightStart Program WHAT TO KNOW ABOUT THE HITRUST RIGHTSTART PROGRAM

blog article

Feb 04, 2019

In an ideal world, every organization would place a high importance on information security, regardless of its maturity level, annual revenue, or contractual obligations. Unfortunately, we don’t live in an ideal world. Many companies—especially new companies—simply don’t have...

Read More

5 Best Practices for Data Breach Prevention in 2019 5 BEST PRACTICES FOR DATA BREACH PREVENTION IN 2019

blog article

Feb 04, 2019

In today’s digital economy an increasing volume of information is collected and data is turning not only into a more valuable, but also into a more vulnerable resource. For businesses it has become a key input for growth, differentiation and for maintaining competitiveness. With data’s e...

Read More

Attacks on SCADA Systems Highlight the Need for Effective Cybersecurity ATTACKS ON SCADA SYSTEMS HIGHLIGHT THE NEED FOR EFFECTIVE CYBERSECURITY

blog article

Feb 04, 2019

In December 2015, more than 200,000 Ukrainians found themselves without power during a blackout cause by a cyberattack launched from within the Russian Federation. The attack was carried out by a spear-phishing campaign that was used to install malware on energy company computers. The malware, dubbe...

Read More

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns MANAGE EMERGING CYBERSECURITY RISKS BY RALLYING AROUND MUTUAL CONCERNS

blog article

Feb 04, 2019

Global risks are intensifying but the collective will to tackle them appears to be lacking. — The World Economic Forum’s “Global Risks Report 2019”. With the start of a new calendar year, chief information security officers (CISOs) are looking for ways to set the tone for the...

Read More

Do You Have a Ransomware Strategy in Place? DO YOU HAVE A RANSOMWARE STRATEGY IN PLACE?

blog article

Feb 04, 2019

Imagine opening your work laptop and seeing a ransom note: All of your data has been encrypted and you have one hour to make a payment in Bitcoin before the price increases. If you don’t make a payment within one day, all of your files will be deleted or posted online for everyone to see. What...

Read More

Announcing the new Security Engineering website ANNOUNCING THE NEW SECURITY ENGINEERING WEBSITE

blog article

Feb 04, 2019

To meet users’ expectations for security when using a product or cloud service, security must be an integral part of all aspects of the lifecycle. We all know this, and yet time has proven that this is far easier said than done because there is no single approach nor silver bullet that works i...

Read More

How Can We Improve Trust in Technology? HOW CAN WE IMPROVE TRUST IN TECHNOLOGY?

blog article

Feb 03, 2019

Who do you trust online? That question may be the No. 1 litmus test for governments, companies, social media interactions, politicians, traditional news media, global websites and the people who use technology over the next decade. Allow me to explain one perspective on this trust question with an e...

Read More

Cycle of Progress: what next for digital transformation CYCLE OF PROGRESS: WHAT NEXT FOR DIGITAL TRANSFORMATION

blog article

Feb 01, 2019

No matter where you are in the world, this time of year is always an opportunity to reflect back on the highs and lows the past year and use these learnings to look forward with fresh eyes into the future. This time around, I’ve had the benefit of leaning on the recent findings of our inaugura...

Read More

Data Breach Fatigue Makes Every Day Feel Like Groundhog Day DATA BREACH FATIGUE MAKES EVERY DAY FEEL LIKE GROUNDHOG DAY

blog article

Feb 01, 2019

The constant string of data breaches isn’t what I’d call funny, but it does make me think about one of my favorite cinematic comedies. The film “Groundhog Day” stars Bill Murray as a grumpy weatherman who travels to the little town of Punxsutawney, Pennsylvania, where a famou...

Read More

Drive Innovation With Your Security Strategy in 2019 DRIVE INNOVATION WITH YOUR SECURITY STRATEGY IN 2019

blog article

Feb 01, 2019

It’s hard to keep New Year’s resolutions. According to U.S. News & World Report, nearly 80 percent of them fail by the second week of February — not because the intent is off or the motivation is gone, but simply because the status quo is easier. Change requires discomfort and ...

Read More

GDPR-compliant organisations reaping the benefits, study finds GDPR-COMPLIANT ORGANISATIONS REAPING THE BENEFITS, STUDY FINDS

blog article

Feb 01, 2019

GDPR-compliant organisations reaping the benefits, study finds Luke Irwin  1st February 2019. Organisations that meet the requirements of the GDPR (General Data Protection Regulation) experience a wide variety of benefits, according to a new Cisco report. The 2019 Data Privacy Benchmark Study d...

Read More

Data Protection Must be the Number One Enterprise Focus in 2019 DATA PROTECTION MUST BE THE NUMBER ONE ENTERPRISE FOCUS IN 2019

blog article

Feb 01, 2019

Sensitive data protection continues to gain priority for many enterprises, especially from the C-suite perspective. The rise of privacy regulations such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) have increased the urgency to manage sensitive data &md...

Read More

Can Security Teams Tame Today’s Cloud Complexity? CAN SECURITY TEAMS TAME TODAY’S CLOUD COMPLEXITY?

blog article

Feb 01, 2019

The promise was that cloud computing would simplify enterprise business-technology. Enterprise users would be able to focus on their applications and services while leaving the deeper security issues associated with infrastructure and secure delivery and management of applications to the cloud provi...

Read More

Why is cyber security important to utility companies & where does mobile fit in? WHY IS CYBER SECURITY IMPORTANT TO UTILITY COMPANIES & WHERE DOES MOBILE FIT IN?

blog article

Jan 31, 2019

It’s never a long wait until the next data breach hits the headlines. Recently, companies such as Whole Foods, Macy’s and British Airways have all suffered data breaches. For the utilities industry, a data breach could have serious consequences — not only for the company under atta...

Read More

6 Best Cybersecurity Podcasts to Follow in 2019 6 BEST CYBERSECURITY PODCASTS TO FOLLOW IN 2019

blog article

Jan 31, 2019

Keeping up with the security industry and latest trends can be daunting, and you don’t always have time in your day to read your favorite news sources or blogs to stay up to speed. That’s where podcasts come in. There are some great security podcasts out there that discuss security news,...

Read More

UK Enterprises to Compete for £70m in Government Cybersecurity Challenge UK ENTERPRISES TO COMPETE FOR £70M IN GOVERNMENT CYBERSECURITY CHALLENGE

blog article

Jan 31, 2019

After 40 percent of UK businesses reported data breaches or security incidents in the past year, the government wants to completely “design out” complex cyber risks and attacks. To achieve this and strengthen national infrastructure and consumer security, officials plan to issue an impre...

Read More

What is Session Hijacking Attack and how to prevent them? WHAT IS SESSION HIJACKING ATTACK AND HOW TO PREVENT THEM?

blog article

Jan 31, 2019

Session hijacking is a web attack carried out by a cybercriminal to steal valuable data or information. It works based on the principle of computer sessions and the cybercriminals makes use of the active sessions. In order to better understand how a session attack happens, it is important to know wh...

Read More

How to Defend Against Motivated and Sophisticated Cyberattackers HOW TO DEFEND AGAINST MOTIVATED AND SOPHISTICATED CYBERATTACKERS

blog article

Jan 31, 2019

They make our most treasured stories so much more interesting. As human beings we’re complex, so we love to see our villains portrayed with layers. We crave a visceral, relatable depiction to send a shiver up the spine. I’d point you in the direction of Anthony Hopkins’ unflinching...

Read More

Buying Email and Web Security Has Gotten Harder BUYING EMAIL AND WEB SECURITY HAS GOTTEN HARDER

blog article

Jan 31, 2019

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email and web security? New Buyer’s Guides give a framework and provide a checklist to get it right. Over the last few years, the way businesses use technology has undergone a complete transformation, dr...

Read More

Learning from the Equifax Data Breach: Understanding the Details of One of the Largest Cyber Attacks of All Time LEARNING FROM THE EQUIFAX DATA BREACH: UNDERSTANDING THE DETAILS OF ONE OF THE LARGEST CYBER ATTACKS OF ALL TIME

blog article

Jan 31, 2019

148 million consumers were affected by the Equifax Data Breach in 2017, more than half of all American adults. The US House of Representatives recently published an extensive report that allows the public to see what happened throughout the attack step by step, the techniques the attackers used to p...

Read More

HOW TO PROTECT YOUR SURVEILLANCE SYSTEM FROM HACKERS HOW TO PROTECT YOUR SURVEILLANCE SYSTEM FROM HACKERS

blog article

Jan 31, 2019

For decades, organizations have used video surveillance systems to secure their business. However, advancements in technology have made it possible for hackers to gain access to security cameras. Today, many businesses utilize Internet Protocol (IP) cameras that require an Internet connection for op...

Read More

How to Prevent Intellectual Property Theft by Insiders HOW TO PREVENT INTELLECTUAL PROPERTY THEFT BY INSIDERS

blog article

Jan 30, 2019

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP includ...

Read More

Nest Cameras Hacked Again. What Can Users Do? NEST CAMERAS HACKED AGAIN. WHAT CAN USERS DO?

blog article

Jan 30, 2019

Nest owners simply can’t get a break from hackers highlighting their security vulnerabilities, as breaches grow more common. After a family in California suffered a War of the Worlds-type episode, being “informed” over Nest that a missile attack from North Korea was imminent, a fam...

Read More

Analyzing a new stealer written in Golang ANALYZING A NEW STEALER WRITTEN IN GOLANG

blog article

Jan 30, 2019

Golang (Go) is a relatively new programming language, and it is not common to find malware written in it. However, new variants written in Go are slowly emerging, presenting a challenge to malware analysts. Applications written in this language are bulky and look much different under a debugger from...

Read More

Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time BUILDING A CYBERSECURITY TALENT PIPELINE ONE CODING CHALLENGE AT A TIME

blog article

Jan 30, 2019

Like many technology companies, Webroot is constantly on the hunt for a diverse pool of engineering and technical cybersecurity talent. According to Jon Oltsik, senior principal analyst with Enterprise Security Group, a cybersecurity skills deficit holds the top position for problematic skills in ES...

Read More

Supporting the UK in becoming a leading global player in cybersecurity SUPPORTING THE UK IN BECOMING A LEADING GLOBAL PLAYER IN CYBERSECURITY

blog article

Jan 30, 2019

By the turn of 2019, Arm technologies had shipped in more than 130 billion silicon chips, making the Arm architecture the most widely-deployed advanced instruction set ever. It’s a constant source of pride, especially for me as chief Arm architect, as there really isn’t a sector – ...

Read More

How Artificial Intelligence Can Be Used Maliciously in Cybersecurity HOW ARTIFICIAL INTELLIGENCE CAN BE USED MALICIOUSLY IN CYBERSECURITY

blog article

Jan 30, 2019

Cybersecurity has become the foremost focus in the realm of technology. Unfortunately, it is readily apparent that it’s impossible for the field to keep up with the continued development of malware and cyber-attack methods. Frighteningly, those who prefer to use their skills maliciously have f...

Read More

Mobile App Development: Maintaining an Environment of Data Integrity and Security MOBILE APP DEVELOPMENT: MAINTAINING AN ENVIRONMENT OF DATA INTEGRITY AND SECURITY

blog article

Jan 30, 2019

According to statistics that measured from the third quarter of 2016 to the first quarter of 2018, there were more than 1,400 new mobile iOS applications released daily through the Apple App Store. During this same timeframe, the Google Play Store added more than 6,100 android apps per day. Judging ...

Read More

Computer Worm Definition and Types. How to Prevent them? COMPUTER WORM DEFINITION AND TYPES. HOW TO PREVENT THEM?

blog article

Jan 30, 2019

Computer Worm. A computer worm is a type of malware program which infects other systems by making multiple copies of itself and spreading itself onto other computers within the network. Worms exploit certain parts of the operating system that are not visible to the user. The infection is only notice...

Read More

VeryMal Mac Attack Hides Data Within a Picture VERYMAL MAC ATTACK HIDES DATA WITHIN A PICTURE

blog article

Jan 29, 2019

A recent malware distribution campaign dubbed "VeryMal" leverages an ancient technique called steganography—the hiding of secret information in plain sight—to distribute Mac malware. The VeryMal campaign was caught distributing OSX/Shlayer, which was originally discovered by In...

Read More

Ensuring Strong Cyber Security at the Edge ENSURING STRONG CYBER SECURITY AT THE EDGE

blog article

Jan 29, 2019

We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications? With edge computing, computati...

Read More

Apple’s FaceTime privacy bug allowed possible spying APPLE’S FACETIME PRIVACY BUG ALLOWED POSSIBLE SPYING

blog article

Jan 29, 2019

Social media caught fire yesterday as the news of a new Apple bug spread. It seemed that there was a flaw in FaceTime that allowed you to place a call to someone, but listen in on their microphone if they didn’t pick up. Worse, as the news spread, it turned out that there was also a way to cap...

Read More

Change Your Password Day: How to breakup with your password CHANGE YOUR PASSWORD DAY: HOW TO BREAKUP WITH YOUR PASSWORD

blog article

Jan 29, 2019

Do you have that one great password that you love? It’s your go-to when creating a new account. You love it because it’s reliable and usually tied to a fond memory like the street you grew up on, or your childhood pet. Problem is, your favorite password is putting you at risk. For many, ...

Read More

Anatova, A modular ransomware ANATOVA, A MODULAR RANSOMWARE

blog article

Jan 29, 2019

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has observed the first ransomware of 2019 — Anatova. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomw...

Read More

Why Monitoring of Network Devices Is Critical for Network Security WHY MONITORING OF NETWORK DEVICES IS CRITICAL FOR NETWORK SECURITY

blog article

Jan 29, 2019

A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to co...

Read More

Is Your Endpoint Security Up to Snuff? IS YOUR ENDPOINT SECURITY UP TO SNUFF?

blog article

Jan 29, 2019

In many network security architectures, businesses tend to emphasize their perimeter protections, trying to keep attackers on the outside. This is, of course, a good idea. Being able to stop attackers from getting into the network in the first place is immensely useful for stopping many attacks befo...

Read More

New Year, New You: 3 Ways to Modernize Your Online Security in 2019 NEW YEAR, NEW YOU: 3 WAYS TO MODERNIZE YOUR ONLINE SECURITY IN 2019

blog article

Jan 29, 2019

Online security measures to protect organizations on the Internet were shown to be wanting again in 2018 – the same bad news about security outside the firewall that we’ve received the year before, and the year before that. It took just 22 lines of malicious code to expose customer payme...

Read More

Hackers target SMBs in supply chain to US Power Grid HACKERS TARGET SMBS IN SUPPLY CHAIN TO US POWER GRID

blog article

Jan 28, 2019

Hackers have learned that to aim for the big guys, they need to compromise the little guys. Supply chain attacks may not be new, but they are evolving, thanks to smarter malware and more insidious tactics. Today’s reality is that there is a mounting magnitude of supply chain cyberattacks that ...

Read More

Onapsis Puts the Process of Security to Work for Oracle E-Business Suite ONAPSIS PUTS THE PROCESS OF SECURITY TO WORK FOR ORACLE E-BUSINESS SUITE

blog article

Jan 28, 2019

IT security is not just a set of products and tools arranged in a manner to protect different layers of the enterprise technology stack. It is a process. Security is only created by you, your teams and your people following processes. I recently had the opportunity to tell this story in an interview...

Read More

Government CIOs to Focus Technology Investments on Data Analytics and Cybersecurity in 2019, Gartner Says GOVERNMENT CIOS TO FOCUS TECHNOLOGY INVESTMENTS ON DATA ANALYTICS AND CYBERSECURITY IN 2019, GARTNER SAYS

blog article

Jan 28, 2019

Chief Information Officers in government are recognizing the importance of investing in game-changing technologies, including artificial intelligence, machine learning, analytics and blockchain. Spending on cybersecurity is projected to continue to rise as the government recognizes its role as the s...

Read More

Japanese government to hack into citizens’ IoT devices as part of ’survey’ JAPANESE GOVERNMENT TO HACK INTO CITIZENS’ IOT DEVICES AS PART OF ’SURVEY’

blog article

Jan 28, 2019

Japan has announced plans to deploy intentional cyber-attacks against its own citizens, citing fears that foreign hackers might try to hack the 2020 Summer Olympics in Tokyo. The initiative has the backing of law after the government passed an amendment on Friday last week. Under the supervision of ...

Read More

WordPress Sites Hit With a Zero-Day WORDPRESS SITES HIT WITH A ZERO-DAY

blog article

Jan 28, 2019

WordPress sites using the Total Donations plugin were hit with a zero-day attack due to multiple design flaws in the code. The Wordfence Threat Intelligence team found several critical vulnerabilities in the plugin on January 16th. All known versions up to 2.0.5 were affected in the attack. Cybercri...

Read More

User of the world’s biggest DDoS-for-hire website? Police say they’re coming after you USER OF THE WORLD’S BIGGEST DDOS-FOR-HIRE WEBSITE? POLICE SAY THEY’RE COMING AFTER YOU

blog article

Jan 27, 2019

When police shut down the notorious website webstresser.org last year and arrested its administrators, a clear message was sent to the site’s 151,000 users: you’re next. Until its takedown, webstresser.org was believed to the world’s biggest marketplace for the hiring of distribute...

Read More

FireEye Warns of a New Method Used by Hackers Conducting RDP Attacks FIREEYE WARNS OF A NEW METHOD USED BY HACKERS CONDUCTING RDP ATTACKS

blog article

Jan 27, 2019

According to a recent report by a cybersecurity company, FireEye, hackers who choose to conduct RDP (Remote Desktop Protocol) attacks are seemingly using a new method to avoid detection and protective measures. Researchers warn that hackers have started increasingly using network tunneling, as well ...

Read More

DHS Issues Emergency Directive DHS ISSUES EMERGENCY DIRECTIVE

blog article

Jan 26, 2019

The Department of Homeland Security (DHS) issued an emergency warning in an effort to protect federal domains from DNS hijacking campaigns. DHS has listed ‘required actions’ for government agencies to complete with ten days. This warning was issued after a series of DNS hijacking attacks...

Read More

Millions of Mortgage and Loan Documents Leaked MILLIONS OF MORTGAGE AND LOAN DOCUMENTS LEAKED

blog article

Jan 26, 2019

Millions of sensitive financial documents were exposed by unprotected servers from the biggest banks in the U.S. These documents went back a decade and include highly sensitive information that revealed financials information of customers. The server contained documents regarding loan and mortgage a...

Read More

WHAT THE GOVERNMENT SHUTDOWN OF 2019 MEANT FOR OUR COLLECTIVE CYBERSECURITY WHAT THE GOVERNMENT SHUTDOWN OF 2019 MEANT FOR OUR COLLECTIVE CYBERSECURITY

blog article

Jan 25, 2019

After five weeks, the partial U.S. government shutdown of 2019 just came to a close. In its wake comes a pinch of American labor and a delay in federal employees receiving their salaries. Additionally, transportation security and other vital federal services exhibited the strain of the prolonged imp...

Read More

How CDW’s Threat Check Finds Hidden Cybersecurity Problems HOW CDW’S THREAT CHECK FINDS HIDDEN CYBERSECURITY PROBLEMS

blog article

Jan 25, 2019

Last fall, CDW helped one of its clients — the director of information security for a midsized energy firm in the Midwest — deal with a situation that had him frustrated and looking for some advice. He knew that his firm was behind the curve in adopting security technology, putting it at...

Read More

BOTNETS: When IOT Goes Rogue BOTNETS: WHEN IOT GOES ROGUE

blog article

Jan 25, 2019

WHAT ARE IoT DEVICES? In a world thriving on interconnectivity, one big development over the last 10 years is not just the invention of IoT devices, but the availability of those devices.  Not only do they extend internet connectivity beyond the standard desktop or laptop, they’ve been de...

Read More

Sly criminals package ransomware with malicious ransom note SLY CRIMINALS PACKAGE RANSOMWARE WITH MALICIOUS RANSOM NOTE

blog article

Jan 25, 2019

Ransomware continues to show signs of evolution. From a simple screen locker to a highly-sophisticated data locker, ransomware has now become a mainstream name, even if (historically), it has been around far longer than we want to look back. Although the criminals behind ransomware campaigns are obs...

Read More

Apple Products Targeted by Malware Hiding in Online Images APPLE PRODUCTS TARGETED BY MALWARE HIDING IN ONLINE IMAGES

blog article

Jan 25, 2019

While the number of online threats has been noticed to be on the rise multiple times in recent years, new reports claim that Apple product users are starting to experience them in larger quantities as well. A recent report published by a cybersecurity company Confidant claims so as well after the co...

Read More

Spear-Phishing: The Smart Malware SPEAR-PHISHING: THE SMART MALWARE

blog article

Jan 24, 2019

Protecting your organization from phishing has never been more important. In this blog, I examine a particularly smart phishing mechanism called spear-phishing, which is becoming increasingly popular, mainly because it’s irresistibly clickable. And that is because it is expertly fine-tuned to ...

Read More

GandCrab Ransomware along with Monero Miner and Spammer GANDCRAB RANSOMWARE ALONG WITH MONERO MINER AND SPAMMER

blog article

Jan 24, 2019

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This ...

Read More

Improved Fallout EK comes back after short hiatus IMPROVED FALLOUT EK COMES BACK AFTER SHORT HIATUS

blog article

Jan 24, 2019

After a short hiatus in early January, the Fallout exploit kit is back in business again with some new features for the new year. During its absence, we noticed an increase in RIG EK campaigns, perhaps to fill that temporary void. Fallout EK is distributed via malvertising chains (one of them we tra...

Read More

The AMIGOs of Cloud Computing and How They Impact IT and Security Teams THE AMIGOS OF CLOUD COMPUTING AND HOW THEY IMPACT IT AND SECURITY TEAMS

blog article

Jan 24, 2019

Amazon, Microsoft, IBM, Google, and Oracle’s IaaS (Infrastructure as a Service) divisions are growing rapidly – so how does this impact in-house IT and security? It’s difficult to go through a typical day at the office without encountering cloud services with every click of the mou...

Read More

Understanding the Types of Cyber Threats on the Rise in 2019 UNDERSTANDING THE TYPES OF CYBER THREATS ON THE RISE IN 2019

blog article

Jan 24, 2019

Keeping your IT environment safe means ensuring your finger is on the pulse of the latest threats in cyber-security. However, while there are always the latest zero-day threats and new attack vectors, each year we see some fundamental repeats. Often attackers find it easy to penetrate networks that ...

Read More

Security Operations Center: A Quick Start Guide SECURITY OPERATIONS CENTER: A QUICK START GUIDE

blog article

Jan 24, 2019

Cybersecurity threats are becoming more common, more dangerous and more difficult to detect and mitigate. According to the Ponemon Institute 2018 Cost of Data Breaches study, organizations take 266 days on average to detect a breach, and over a month to contain it. Companies of all sizes need a form...

Read More

SAP Security Notes 2018: Lessons Learned and a Look to What SAP SECURITY NOTES 2018: LESSONS LEARNED AND A LOOK TO WHAT'S AHEAD IN 2019

blog article

Jan 24, 2019

2019 has just begun, but the year is already looking busy in the ERP security world. We’ve decided to put together this blog post as a two-part analysis: the Onapsis Research Labs’ recently completed wrap-up of the SAP Security Notes for 2018 and the World Economic Forum’s Global R...

Read More

Make the Most of Exchange Online Advanced Threat Protection MAKE THE MOST OF EXCHANGE ONLINE ADVANCED THREAT PROTECTION

blog article

Jan 24, 2019

Attackers use a variety of trajectories to infiltrate organizations with viruses and malware these days. There is a premium service from Microsoft Exchange called Exchange Online Advanced Threat Protection (ATP) that offers five distinct features that add additional layers of security to your email ...

Read More

Cyber Threat Intelligence and security level maintenance: an essential combination CYBER THREAT INTELLIGENCE AND SECURITY LEVEL MAINTENANCE: AN ESSENTIAL COMBINATION

blog article

Jan 23, 2019

The internet, system networks and information systems have become a real battleground, with every operator having to tackle rapidly growing and progressive cyber threats in a context where attackers have a clear advantage over defenders. In the best-case scenario, an information system will be imple...

Read More

Trojan Horse: Definition and How to Prevent this Virus TROJAN HORSE: DEFINITION AND HOW TO PREVENT THIS VIRUS

blog article

Jan 23, 2019

A Trojan horse is a type of malware often disguised as legitimate software. Unlike computer worms and viruses, Trojans are not able to self-replicate. Hackers and cyber-thieves who try to gain access to a user’s system use Trojans. Users fall for some form of social engineering and accidentall...

Read More

Predictions for 2019: Cybersecurity skills shortages are getting worse PREDICTIONS FOR 2019: CYBERSECURITY SKILLS SHORTAGES ARE GETTING WORSE

blog article

Jan 23, 2019

Where will this year’s big cyber security storm come from? What issues are currently keeping information security managers awake at night? December and January is the time when commentators, software vendors and industry insiders tell us what they think is going to happen over the next 12 mont...

Read More

Oklahoma Department of Securities Exposes 3TB of Data OKLAHOMA DEPARTMENT OF SECURITIES EXPOSES 3TB OF DATA

blog article

Jan 23, 2019

The Oklahoma Department of Securities Commission (ODS) disclosed of a huge data leak last week. Many of the files dating back decades included details of FBI investigations, social security numbers, names of AIDS patients, and credentials for remote access to computers. Researchers at UpGaurd first ...

Read More

What is Red, Blue and Purple Teaming? WHAT IS RED, BLUE AND PURPLE TEAMING?

blog article

Jan 23, 2019

Chances are you’ve read our piece on penetration testing and want to get into the field. It’s certainly exciting and full of intrigue. Now that you’re going to go for it, it is very important that you know the different sub divisions in it. Those areas are red, blue and purple. Eac...

Read More

Are You Ready for the Next Attack? 5 Tweaks to Your Incident Response Plan ARE YOU READY FOR THE NEXT ATTACK? 5 TWEAKS TO YOUR INCIDENT RESPONSE PLAN

blog article

Jan 23, 2019

IT security professionals have to deal with preventing and managing a variety of network security risks in their daily work, including cybercrime, the compromise of sensitive data, and service outages. The first line of defense is always prevention, and a slew of tools are used to help with this, in...

Read More

Penetration (Pen) Testing for SMBs PENETRATION (PEN) TESTING FOR SMBS

blog article

Jan 22, 2019

Security jargon can be very confusing. Scanning, Pen Tests, Red Team Exercises and now Purple Teaming. It is easy to understand why companies under- or over- spend or simply choose not to test their systems. What’s the difference and which is right for your business? What is a Pen Test? A Pen ...

Read More

Advanced Information Security Features for Microsoft Office 365 ADVANCED INFORMATION SECURITY FEATURES FOR MICROSOFT OFFICE 365

blog article

Jan 22, 2019

In the last few years, Microsoft Office 365 (MO365) has eclipsed all other cloud providers to emerge as the most widely used enterprise cloud service and the latest survey data shows that adoption of MO365 is still increasing. It is not just impressive in its adoption rates, Microsoft has also been ...

Read More

Reducing Cyber Risk: 5 Tweaks to Your Incident Response Plan REDUCING CYBER RISK: 5 TWEAKS TO YOUR INCIDENT RESPONSE PLAN

blog article

Jan 22, 2019

An incident response plan is a crucial set of instructions designed to help your IT department—security team at larger companies—properly deal with the slew of network security incidents that can hamper your business at any given moment. Such incidents include (but are not limited to) ra...

Read More

Strengthen your data privacy practices STRENGTHEN YOUR DATA PRIVACY PRACTICES

blog article

Jan 22, 2019

Your business, whatever its size, most likely processes and maintains information every day. At least annually, take time to review your data privacy practices to reinforce your information security and to reassess your cyber protection. Free government resources are available to help protect your c...

Read More

Auto-Adapting to the Needs of Industrial Cybersecurity 4.0 AUTO-ADAPTING TO THE NEEDS OF INDUSTRIAL CYBERSECURITY 4.0

blog article

Jan 22, 2019

Cybersecurity touches every aspect of our lives, work, and even our cities. The scope and breadth of cyber-attacks are growing in both size and complexity. In terms of size, a report recently demonstrated that Distributed Denial of Service (DDoS) attacks have been increasing, on average, by 500%. In...

Read More

Could your texts be leaked? COULD YOUR TEXTS BE LEAKED?

blog article

Jan 21, 2019

Text leaks can happen to anyone using SMS, but you can avoid it with end-to-end encryption. At a time when our digital world can hold the keys to our success or failure, tight security around anything and everything we send out to the internet, or even through the internet, is essential. As data bre...

Read More

Google fined $57M under GDPR GOOGLE FINED $57M UNDER GDPR

blog article

Jan 21, 2019

New European standards go harder on data collectors to protect user privacy. The Commissione nationale de l’informatique et des libertés (CNIL) is an independent French committee dedicated to upholding its country’s commitment to the General Data Protection Regulation (GDPR), a ne...

Read More

Northern New Mexico College improves campus cybersecurity with Avast NORTHERN NEW MEXICO COLLEGE IMPROVES CAMPUS CYBERSECURITY WITH AVAST

blog article

Jan 21, 2019

Gains better visibility of cybersecurity health, improves threat protection with Avast Business Antivirus and management console. The College. Northern New Mexico College is known as the most affordable and diverse four-year college in New Mexico. With campuses in Española and El Rito, the co...

Read More

What Is SIEM And How To Choose The Right Tool WHAT IS SIEM AND HOW TO CHOOSE THE RIGHT TOOL

blog article

Jan 21, 2019

Understanding, Selecting and Using SIEM. One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and compl...

Read More

Top Cybersecurity Threats Right Now TOP CYBERSECURITY THREATS RIGHT NOW

blog article

Jan 21, 2019

Bar none, cybersecurity has to be a major consideration for every business owner or manager in business today. The prevalence of people looking to rip your company off has never been higher; and that is the truth for nearly every company that uses the Internet for anything. Today, we take a look at ...

Read More

Important cybersecurity statistics for 2019 IMPORTANT CYBERSECURITY STATISTICS FOR 2019

blog article

Jan 20, 2019

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there i...

Read More

Alan Woodward’s Top 10 Cybersecurity Predictions for 2019 ALAN WOODWARD’S TOP 10 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Jan 19, 2019

Alan Woodward is a British computer scientist and visiting professor at the University of Surrey. He is a specialist in computer security with particular expertise in covert communications, forensic computing and image/signal processing. Professor Woodward is a Fellow of the Institute of Physics, a ...

Read More

Security Bug Exposed Private Tweets for Years SECURITY BUG EXPOSED PRIVATE TWEETS FOR YEARS

blog article

Jan 19, 2019

Twitter discovered a bug in the system that made users’ private tweets public for over four years. This vulnerability occurred to the Android Twitter app. User’s using the IOS app or the Web to use Twitter were not affected by the vulnerability. The social media site posted to Twitter&rs...

Read More

Why network-level access is critical for attackers WHY NETWORK-LEVEL ACCESS IS CRITICAL FOR ATTACKERS

blog article

Jan 19, 2019

In recent months, we’ve seen a new trend where malware is used to load and distribute other types of threats like ransomware, trojans, backdoors etc. Malware distribution as a service. One recent example of this was when attackers used the Emotet malware family as a distributor to circulate hi...

Read More

43% of Enterprises Not Ready to Say Goodbye to Windows 7 43% OF ENTERPRISES NOT READY TO SAY GOODBYE TO WINDOWS 7

blog article

Jan 18, 2019

2020 will bring the end of Windows 7, following Microsoft’s announcement that it will no longer offer support and updates for the operating system starting January 14, 2020. But companies appear to have had a good run with it and are not yet ready to say goodbye, a Kollective survey of 1,000 U...

Read More

Improvements to SiteCheck Website Scanne IMPROVEMENTS TO SITECHECK WEBSITE SCANNE

blog article

Jan 18, 2019

SiteCheck is Sucuri’s free website malware and security scanner offered to anyone who wants to scan their websites for malware and blacklist status. Last year, we improved SiteCheck’s speed and reliability. Today, we are excited to share the latest upgrades that makes SiteCheck even bett...

Read More

3 Ways App Development Companies Can Improve Cyber Security Processes 3 WAYS APP DEVELOPMENT COMPANIES CAN IMPROVE CYBER SECURITY PROCESSES

blog article

Jan 18, 2019

The modern world is addicted to the use of mobile devices. Virtually every activity or task handled electronically can be performed with a mobile device, including: shopping, banking, entertainment, and even controlling other devices in the workplace, shop, and home. No doubt, app development compan...

Read More

What is PCI DSS and why do I need it? WHAT IS PCI DSS AND WHY DO I NEED IT?

blog article

Jan 18, 2019

PCI DSS is an incredibly important compliance standard for those processing card payments. It stands for Payment Card Industry Data Security Standard. Whilst that doesn’t exactly roll off the tongue, it is a very resilient set of standard requirements that aims to make a business more secure. ...

Read More

Three Quick Wins To Manage and Reduce Your Cyber Risk—Beyond Protection THREE QUICK WINS TO MANAGE AND REDUCE YOUR CYBER RISK—BEYOND PROTECTION

blog article

Jan 18, 2019

There are plenty of ways to manage (and reduce) your cyber risk beyond the core protection and compliance investments. Here are the three methods of managing cyber risk we find most effective. 1. Detect and Patch Security Vulnerabilities Faster “Known vulnerabilities offer cyber-criminals an e...

Read More

IPS Security: How Active Security Saves Time and Stops Attacks in their Tracks IPS SECURITY: HOW ACTIVE SECURITY SAVES TIME AND STOPS ATTACKS IN THEIR TRACKS

blog article

Jan 17, 2019

What is IPS Security? An intrusion prevention system (IPS) is a network security technology that monitors network traffic to detect anomalies in traffic flow. IPS security systems intercept network traffic and can quickly prevent malicious activity by dropping packets or resetting connections. IDS v...

Read More

A Deep Dive into Point of Sale Security A DEEP DIVE INTO POINT OF SALE SECURITY

blog article

Jan 17, 2019

Many businesses think of their Point of Sale (POS) systems as an extension of a cashier behind a sales desk. But with multiple risk factors to consider, such as network connectivity, open ports, internet access and communication with the most sensitive data a company handles, POS solutions are more ...

Read More

Avoiding Critical Security Risk Analysis Mistakes AVOIDING CRITICAL SECURITY RISK ANALYSIS MISTAKES

blog article

Jan 17, 2019

Healthcare organizations and their business associates must be careful to avoid making mistakes with their HIPAA security risk analysis in case they ever undergo a compliance review or breach investigation by federal regulators, says privacy attorney Adam Greene. “What I see a lot of – a...

Read More

Effective Data Security When Recycling Corporate E-Waste EFFECTIVE DATA SECURITY WHEN RECYCLING CORPORATE E-WASTE

blog article

Jan 17, 2019

In today's progressively digital world, data security is just as important as its physical counterpart. Sensitive data stored in servers, laptops, and any other form of e-waste can be compromised any time there's an attack by a malicious entity. Sensitive data can be any of the following: Tr...

Read More

BenefitMall Hit by Months-Long Data Breach BENEFITMALL HIT BY MONTHS-LONG DATA BREACH

blog article

Jan 17, 2019

The Dallas-based payroll firm BenefitMall announced on January 4 that nearly 112,000 customers may have had their personal information exposed during a four-month long data breach. The breach was discovered on October 11, when the company realized that several internal email accounts had been compro...

Read More

Is it Dangerous to Rely Too Heavily on Predictive Analytics for Fighting Ransomware? IS IT DANGEROUS TO RELY TOO HEAVILY ON PREDICTIVE ANALYTICS FOR FIGHTING RANSOMWARE?

blog article

Jan 17, 2019

Ransomware is a rising threat to businesses all over the world. Between 2016 and 2017, the number of ransomware incidents increased by 350%. The FBI now estimates that there are 4,000 ransomware attacks every day. Digital security experts are desperately looking for new ways to thwart these attacks....

Read More

The U.S. Government Blaming Cyber Attacks on Russia May Cost One Business $100 Million THE U.S. GOVERNMENT BLAMING CYBER ATTACKS ON RUSSIA MAY COST ONE BUSINESS $100 MILLION

blog article

Jan 17, 2019

Governments attributing cyberattacks to specific countries usually ends in nothing more than a line in a news story. But sometimes these kinds of claims can have unforeseen consequences. The $100 Million insurance coverage lawsuit between Mondelez, the owner of brands such as Oreos and Nabisco, and ...

Read More

5 Cyber Security Threats Facing Enterprises in 2019 5 CYBER SECURITY THREATS FACING ENTERPRISES IN 2019

blog article

Jan 17, 2019

The cyber threat atmosphere is becoming more perilous every day. A recent survey by the World Economic Forum revealed the number-one concern of executives in advanced economies is cyber-attacks. Here are the top 5 cyber security threats companies can anticipate to contend with in 2019. Phishing Sche...

Read More

Nanocore RAT Malware – How to Remove this Virus from Infecting NANOCORE RAT MALWARE – HOW TO REMOVE THIS VIRUS FROM INFECTING

blog article

Jan 17, 2019

Nanocore is a remote access Trojan virus otherwise known as RAT Malware which is used in both targeted and non-targeted attacks. Ever since malware engineers created it, RATs have aided online criminals in launching attacks even on mobile devices for financial gain, espionage or for something more s...

Read More

Validating Your Microsoft Azure Cloud Security VALIDATING YOUR MICROSOFT AZURE CLOUD SECURITY

blog article

Jan 17, 2019

As organizations continue to adopt the cloud and manage a hybrid cloud environment, it’s important to recognize how securing your Microsoft Azure cloud environment is different than securing your data center, and then learning the steps you need to take to secure your infrastructure. To begin,...

Read More

Too Much and Not Enough: Why Cybersecurity Is IT’s Top Challenge for 2019 TOO MUCH AND NOT ENOUGH: WHY CYBERSECURITY IS IT’S TOP CHALLENGE FOR 2019

blog article

Jan 17, 2019

One in four servers at the average enterprise is not fully up to date with the latest security and software patches, according to INAP’S new survey, The State of IT Infrastructure Management. And that’s not all: A majority of IT pros believe that the time it takes their team to address c...

Read More

TOP 3 BUSINESS CYBER SECURITY TRENDS TO WATCH FOR IN 2019 TOP 3 BUSINESS CYBER SECURITY TRENDS TO WATCH FOR IN 2019

blog article

Jan 17, 2019

Technology has integrated itself into just about every business. New innovations have created opportunities for businesses to operate faster and more efficiently than ever before. No matter the industry, businesses need to use technology to not only stay competitive, but also survive. Unfortunately,...

Read More

The Evolution of Cyber Security Protection THE EVOLUTION OF CYBER SECURITY PROTECTION

blog article

Jan 16, 2019

Both cybercriminals and the means to defend against them have evolved significantly in recent years. Looking back over the last thirty years of cybercrime reveals the scale of that change, and highlights the importance of strong online security for businesses of all shapes and sizes. While cybersecu...

Read More

Citrix CISO Stan Black: What it takes to win Cybersecurity Pro of the Year CITRIX CISO STAN BLACK: WHAT IT TAKES TO WIN CYBERSECURITY PRO OF THE YEAR

blog article

Jan 16, 2019

Stan Black’s organization at Citrix stops 56 billion unique attacks each quarter. As Chief Security and Information Officer, Stan has simplified IT and security at Citrix to focus on threat prevention and to ensure a better user experience. Keep reading to learn about his organization, what se...

Read More

Top 3 Cyberattacks Targeting Proxy Servers TOP 3 CYBERATTACKS TARGETING PROXY SERVERS

blog article

Jan 16, 2019

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a cyberattack. As a facilitator of access to content and networks, proxy server...

Read More

Building a cyber security super team BUILDING A CYBER SECURITY SUPER TEAM

blog article

Jan 16, 2019

Tom Mullen, O2’s Head of cyber security, considers the global growth in cybercrime and the skills shortage that is affecting every business. The cybercrime epidemic. Cybercrime is big business. And it’s growing rapidly, becoming a threat to every organisation regardless of size, industry...

Read More

NCSC Cross Domain Solutions Industry Pilot NCSC CROSS DOMAIN SOLUTIONS INDUSTRY PILOT

blog article

Jan 16, 2019

Will I ever be able to safely connect my IT system to other IT systems that I don't own, and probably don't trust? This key question is one that the NCSC is asked frequently. We know that there is a growing need and diversity of reasons for wanting to connect different computer networks toge...

Read More

Modern Ransomware Goes After Data Backups MODERN RANSOMWARE GOES AFTER DATA BACKUPS

blog article

Jan 16, 2019

Ransomware is using a variety of methods to reduce or nullify the effectiveness of data backups, writes Maria Korolov at CSO. Restoring from a backup is one of the best strategies that organizations can use to recover from a ransomware attack, so it’s obvious why attackers would want to target...

Read More

INSIGHT: Cybersecurity Attacks, Prevention Call for Attorneys, Rapid Response Teams INSIGHT: CYBERSECURITY ATTACKS, PREVENTION CALL FOR ATTORNEYS, RAPID RESPONSE TEAMS

blog article

Jan 16, 2019

As an ever-increasing number of organizations of any size and in any industry can attest, cybersecurity incidents and breaches can leave significant organizational damage and business disruption in their wake. It is critical, therefore, to have experts in the relevant areas identified and standing b...

Read More

CYBER INSURANCE PERHAPS ISN’T THE ANSWER CYBER INSURANCE PERHAPS ISN’T THE ANSWER

blog article

Jan 16, 2019

In June 2017, a ransomware cyber attack spread through Europe and the US affecting companies such as advertising giant WWP, law firm DLA Piper, Danish shipping and transport giant AP Moller Maersk and Mondelez, a multinational confectionery, food and beverage company. The attack, known as NotPetya, ...

Read More

The Advanced Persistent Threat files: APT10 THE ADVANCED PERSISTENT THREAT FILES: APT10

blog article

Jan 16, 2019

We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed attacks on specific targets with the intention to compromise their systems and gain information from or about that target. While the targets may be anyone or anything&m...

Read More

The Acquired Breach: How to Spot Cyber Risk in Your Acquisition THE ACQUIRED BREACH: HOW TO SPOT CYBER RISK IN YOUR ACQUISITION

blog article

Jan 16, 2019

Your company just acquired another business and things are great. Your market cap is growing, shareholders are happy, and teams are working hard. Then, you get a call that makes your stomach turn. Your team has uncovered an ongoing breach in the company you just acquired. Your world changes immediat...

Read More

Keep Your Eye on These 3 Key Cybersecurity Trends for 2019 KEEP YOUR EYE ON THESE 3 KEY CYBERSECURITY TRENDS FOR 2019

blog article

Jan 16, 2019

Effective security requires an organization to know where its data resides and how it’s being used, especially when that data is migrated to the cloud. When you lose sight of these factors, you lose control of security. A company I work with recently encountered a situation that highlights the...

Read More

Understanding Zero-Day Attacks UNDERSTANDING ZERO-DAY ATTACKS

blog article

Jan 15, 2019

The Rise of Zero-Day Exploits and Attacks. Part of forming an effective cybersecurity strategy means understanding the threats that can impact your organization. One form of threat that is on the rise and steadily evolving in complexity and danger is a zero-day attack, also referred to as a zero-day...

Read More

Shifting to DevSecOps, with Software Security Testing Built In SHIFTING TO DEVSECOPS, WITH SOFTWARE SECURITY TESTING BUILT IN

blog article

Jan 15, 2019

Many organizations today are in the process of transitioning to a DevOps-centric approach, but don’t want to leave security behind. In order to build security in from the beginning of their software development process, it’s essential to enhance your security posture by integrating appli...

Read More

How to Protect Your Office 365 Email Users from Phishing HOW TO PROTECT YOUR OFFICE 365 EMAIL USERS FROM PHISHING

blog article

Jan 15, 2019

Phishing emails targeting Office 365 customers are the top source of security breaches, according to survey data. In cased you missed it, in 2018 phishing officially the top concern for IT and security managers who have deployed Office 365 at their companies, having eked past ransomware according to...

Read More

What We’ve Learned from the Evolving IT Landscape and Where Cybersecurity is Headed in 2019 WHAT WE’VE LEARNED FROM THE EVOLVING IT LANDSCAPE AND WHERE CYBERSECURITY IS HEADED IN 2019

blog article

Jan 15, 2019

The new year is always a good time for reflection. At Circadence, we look back on the dynamic IT landscape and ever-evolving threats to understand where CISOs and security leaders can direct their attention in 2019 and prioritize new security practices. To learn more, we tapped into our own cybersec...

Read More

Opinion: AL and ML choices can dramatically impact data security OPINION: AL AND ML CHOICES CAN DRAMATICALLY IMPACT DATA SECURITY

blog article

Jan 15, 2019

As networks have advanced in complexity, so have the tools and tactics of cybercriminals. Organizations increase their cybersecurity budgets and teams, yet breaches keep occurring. In the fight for stronger security, vendors are offering up AI and machine learning as a Holy Grail. But do these techn...

Read More

Data Loss Prevention — Policies, Best Practices, and Evaluating DLP Software DATA LOSS PREVENTION — POLICIES, BEST PRACTICES, AND EVALUATING DLP SOFTWARE

blog article

Jan 15, 2019

What is DLP? Data loss prevention (DLP) is an approach that seeks to protect business information. It prevents end-users from moving key information outside the network. DLP also refers to tools that enable a network administrator to monitor data accessed and shared by end users. Trends Driving DLP ...

Read More

Findings of our survey show that cyber awareness training is badly needed for organizations FINDINGS OF OUR SURVEY SHOW THAT CYBER AWARENESS TRAINING IS BADLY NEEDED FOR ORGANIZATIONS

blog article

Jan 15, 2019

Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the best of intentions, sometimes their actions can lead to major cybersecurity faux pas. But, how much of it is because of poor behavior or bad deci...

Read More

Establishing a council for the cyber security profession ESTABLISHING A COUNCIL FOR THE CYBER SECURITY PROFESSION

blog article

Jan 15, 2019

Back in July I talked about the work we had been doing with colleagues in DCMS to bring greater cohesion to the cyber security profession in the UK.  There was an excellent response to the consultation (which you can read here), which reinforced the direction of travel to establish a Cyber Secu...

Read More

Government shutdown impacts .gov websites, puts Americans in danger GOVERNMENT SHUTDOWN IMPACTS .GOV WEBSITES, PUTS AMERICANS IN DANGER

blog article

Jan 14, 2019

If you are in the United States, then you likely already know that we are on our 24th day of a government shutdown. While it is considered a “partial” shutdown, there are still plenty of government workers who are furloughed, which impacts the services they run—both online and off....

Read More

Fighting the Evolution of Malware FIGHTING THE EVOLUTION OF MALWARE

blog article

Jan 14, 2019

Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions of vulnerable IoT devices a...

Read More

Cyber Threats In The Banking Industry CYBER THREATS IN THE BANKING INDUSTRY

blog article

Jan 14, 2019

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in ot...

Read More

Does Malware Have Citizenship? DOES MALWARE HAVE CITIZENSHIP?

blog article

Jan 14, 2019

In talks with information security professionals at security conferences, user group events, and customer sites, Chester Wisniewski frequently fields questions about country-based blocking as a network defense tactic. Though he couldn’t find any published data to confirm his assumptions, &ldqu...

Read More

AI Seen as Taking Increasingly Lead Role in Fight against Cyber Threats AI SEEN AS TAKING INCREASINGLY LEAD ROLE IN FIGHT AGAINST CYBER THREATS

blog article

Jan 13, 2019

The business world has been slow to incorporate AI as a security measure but that’s going to change in 2019. More than 25 years ago, the worldwide web was likened to the wild west – a virtual frontier lined with black hats gunning to spread viruses that latched onto computers, erase thei...

Read More

CyberFirst Girls Competition 2019 - a chance to shine CYBERFIRST GIRLS COMPETITION 2019 - A CHANCE TO SHINE

blog article

Jan 11, 2019

In 2017, when we developed the idea of holding a competition to encourage more young girls to study GCSE computer science, I don’t think we appreciated the huge interest that it would generate and the fantastic talent that it would uncover. In hindsight, we shouldn’t have been surprised ...

Read More

The Human Factor of Cyber Security THE HUMAN FACTOR OF CYBER SECURITY

blog article

Jan 11, 2019

Tom Mullen, O2’s Head of Cyber Security, considers the human aspect of cyber security. We read about cyber-attacks disrupting businesses on an almost daily basis. And they are becoming more sophisticated. Today, cyber security breaches can often be attributed to the domain of organised crime, ...

Read More

F-Secure Cyber Security Services captures security award F-SECURE CYBER SECURITY SERVICES CAPTURES SECURITY AWARD

blog article

Jan 11, 2019

The Finnish cyber security company was deemed to be best in class by the Finnish Security Awards in the Future Category from among three finalists. Also in this category were the Ministry of Employment and the Economy AI technology and The Technical Research Center of Finland’s (VTT) vehicle t...

Read More

The Evolution of Malware Identification THE EVOLUTION OF MALWARE IDENTIFICATION

blog article

Jan 11, 2019

Code is what allows website owners to customize their websites and make it unique. However, sometimes malware can sneak into that code, resulting in a potentially harmful impact to unsuspecting users. Using today’s techniques, how would you distinguish which code is good and which code is bad?...

Read More

5 CYBERSECURITY TRENDS FOR 2019 5 CYBERSECURITY TRENDS FOR 2019

blog article

Jan 11, 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice...

Read More

Comprehensive Guide to IoMT Cybersecurity – Risks, Safeguards, and What We Protect COMPREHENSIVE GUIDE TO IOMT CYBERSECURITY – RISKS, SAFEGUARDS, AND WHAT WE PROTECT

blog article

Jan 11, 2019

The Internet of Medical Things, also known as the IoMT, is one of the most revolutionary developments in healthcare today.  It empowers physicians to monitor patients remotely by providing the patient with network-enabled devices. These devices can track a wide variety of processes, from medica...

Read More

DOING YOUR PART FOR A SAFER INTERNET DOING YOUR PART FOR A SAFER INTERNET

blog article

Jan 10, 2019

February 5th is Safer Internet Day, an international effort aimed at making our world wide web safer for every kind of user. This year’s theme, “Together for a better internet”, focuses on creating a better internet for all users. Whether it’s children playing a game or doing...

Read More

AI IN CYBERSECURITY: THE IDC AI INNOVATORS REPORT AND WHAT IT MEANS FOR SECURITY PRACTITIONERS AI IN CYBERSECURITY: THE IDC AI INNOVATORS REPORT AND WHAT IT MEANS FOR SECURITY PRACTITIONERS

blog article

Jan 10, 2019

Back in 2017, Cybereason CSO Sam Curry and CTO Yonatan Striem-Amit spoke to a crowded room at the RSA Conference about the hype and hope of AI and Machine Learning. Fast forward a year later, where Cybereason was recently named an IDC Innovator in the IDC Innovators: AI Intelligence-Infused Security...

Read More

Security Leadership Series: Take a Partnership Approach to Cybersecurity SECURITY LEADERSHIP SERIES: TAKE A PARTNERSHIP APPROACH TO CYBERSECURITY

blog article

Jan 10, 2019

Unfortunately, some cybersecurity professionals approach their work with an “us against the world” mentality. They’re constantly frustrated because others within their organization don’t seem to understand why cybersecurity is important. They feel like they are always having ...

Read More

6 Standout Device Control Features in Endpoint Protector 6 STANDOUT DEVICE CONTROL FEATURES IN ENDPOINT PROTECTOR

blog article

Jan 10, 2019

With the rise of Bring-Your-Own-Device (BYOD) policies and the proliferation of personal devices, organizations often risk losing data due to employee negligence or malicious intentions. After all, no matter how secure a company network is, the moment an employee transfers sensitive information onto...

Read More

OpSec: A Vital Part of Any Cybersecurity Program OPSEC: A VITAL PART OF ANY CYBERSECURITY PROGRAM

blog article

Jan 10, 2019

We all have something to hide. Even though humans are social beings, there are some things we want to keep to ourselves, and it’s been like that since the beginning of humankind. In the digital world, the format in which those secrets are kept is what we keep in focus, in contrast to the &rsqu...

Read More

A Nasty Trick: From Credential Theft Malware to Business Disruption A NASTY TRICK: FROM CREDENTIAL THEFT MALWARE TO BUSINESS DISRUPTION

blog article

Jan 10, 2019

FireEye is tracking a set of financially-motivated activity referred to as TEMP.MixMaster that involves the interactive deployment of Ryuk ransomware following TrickBot malware infections. These operations have been active since at least December 2017, with a notable uptick in the latter half of 201...

Read More

Achieve Data Security with Strong Internal and External Perimeters ACHIEVE DATA SECURITY WITH STRONG INTERNAL AND EXTERNAL PERIMETERS

blog article

Jan 09, 2019

Securing your organization’s most sensitive content is analogous to securing a busy office building. If you’re in charge of security in an office building, you must protect your tenants amid a constant flux of employees and visitors. You must keep the building, its employees, and their p...

Read More

Opinion How to drive home the Importance of data security with company stakeholders OPINION HOW TO DRIVE HOME THE IMPORTANCE OF DATA SECURITY WITH COMPANY STAKEHOLDERS

blog article

Jan 09, 2019

For the modern business, there are few topics more important than data security. Without a proper appreciation for data security and all that it entails, you’ll find your business falling behind. But getting all of your employees and company stakeholders on board can prove to be a major challe...

Read More

New Year, New Threats: 4 Cybersecurity Predictions For 2019 NEW YEAR, NEW THREATS: 4 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Jan 09, 2019

The new year has always been an important marker for cybersecurity professionals – just think back to Y2K and the widespread concern that every piece of technology might stop working at midnight on January 1, 2000. After a tough 2018, marked by extensive spam communication via both email and t...

Read More

What is Hybris Computer Worm? WHAT IS HYBRIS COMPUTER WORM?

blog article

Jan 09, 2019

Hybris Worm is a type of malware (computer worm) that multiplies by automatically replicating itsef. This type of computer worm has the capability to multiply not just within an infected system but also expanding to other systems that are connected to the same network. The mode of infection within t...

Read More

Cyber Security Marketing Tactics That Actually Work CYBER SECURITY MARKETING TACTICS THAT ACTUALLY WORK

blog article

Jan 09, 2019

Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping. In fact, according to a Cybersecurity Market Report published ...

Read More

Good password security: the perfect New Year’s resolution for your business and employees GOOD PASSWORD SECURITY: THE PERFECT NEW YEAR’S RESOLUTION FOR YOUR BUSINESS AND EMPLOYEES

blog article

Jan 09, 2019

The New Year’s resolutions we stick to have a few things in common: they’re realistic, focused, and have clear benefits. That’s why improving company-wide password habits is a great resolution for 2019. According to the most recent data from Verizon, over 70% of employees reuse pas...

Read More

Ransomware displaced by cryptojacking as the most trending cyberthreat but it is not dead yet RANSOMWARE DISPLACED BY CRYPTOJACKING AS THE MOST TRENDING CYBERTHREAT BUT IT IS NOT DEAD YET

blog article

Jan 09, 2019

For those of you who have experienced the worst of Ransomware attacks in the form of WannaCry and Petya and believe that the worst is over; you never know what may await you on the other side of this New Year. While the recent threat analysis reports by Quick Heal Security, Labs suggest a significan...

Read More

Revisiting the 2018 Threat Forecast REVISITING THE 2018 THREAT FORECAST

blog article

Jan 09, 2019

In the 2017 Annual Threat Report, the eSentire Threat Intelligence team documented a series of scenarios that could potentially occur though 2018. The likelihood of each forecast scenario increased or decreased according specific indicator events occurring. The 2017 report also contained a trend ana...

Read More

Privileged Access Management Compliance Through the Eyes of an Auditor PRIVILEGED ACCESS MANAGEMENT COMPLIANCE THROUGH THE EYES OF AN AUDITOR

blog article

Jan 08, 2019

Compliance audits are a stressful, time-consuming effort for many companies. In the Lockdown blog, we often talk about the tools and processes customers use to prepare for both internal and external information security audits. This time we thought we’d turn the tables and speak directly to an...

Read More

Operation Aurora – 2010’s Major Breach by Chinese Hackers OPERATION AURORA – 2010’S MAJOR BREACH BY CHINESE HACKERS

blog article

Jan 08, 2019

As security practitioners and history buffs, we’re intrigued by the history of cybersecurity. So much so, we built a calendar around it this year. Each month of the History of Cybersecurity 2019 Calendar features a significant date in cybersecurity history, along with a related trivia question...

Read More

Measuring Cybersecurity Success MEASURING CYBERSECURITY SUCCESS

blog article

Jan 08, 2019

Many CISOs struggle to build a compelling business narrative around their cybersecurity efforts. So when they stand before C-execs or board members, they turn to quantitative measures to craft a basic blocking-and-tackling story (check out how many suspicious connections our firewalls blocked last q...

Read More

Ryuk ransomware attacks businesses over the holidays RYUK RANSOMWARE ATTACKS BUSINESSES OVER THE HOLIDAYS

blog article

Jan 08, 2019

While families gathered for food and merriment on Christmas Eve, most businesses slumbered. Nothing was stirring, not even a mouse—or so they thought. For those at Tribune Publishing and Data Resolution, however, a silent attack was slowly spreading through their networks, encrypting data and ...

Read More

Tips on Cybersecurity Vendor Risk Management for the Board of Directors TIPS ON CYBERSECURITY VENDOR RISK MANAGEMENT FOR THE BOARD OF DIRECTORS

blog article

Jan 08, 2019

Think about your vendors. Each one presents a unique risk to you. Whether it’s a risk to information security or the availability of your company’s product or service, all vendor services come with a specific level of risk. In the current technological environment, vendors are not only h...

Read More

Scheduled Network Maintenance: How Does It Affect Your Customer’s Business SCHEDULED NETWORK MAINTENANCE: HOW DOES IT AFFECT YOUR CUSTOMER’S BUSINESS

blog article

Jan 08, 2019

As a managed services provider (MSP) it is your responsibility to manage and maintain not only the endpoints on your clients’ networks but also the networks themselves. This may not be terribly important for very small businesses, especially if they are just starting out. However, as your clie...

Read More

IoT Cybersecurity Challenges and Solutions IOT CYBERSECURITY CHALLENGES AND SOLUTIONS

blog article

Jan 08, 2019

The Internet of Things (IoT) is simply an interconnected array of electronic devices that are linked by the Internet, through which they can transmit and receive data. The original “thing” was a Coca Cola vending machine that was able to report back to HQ how many bottles of soda were le...

Read More

SAP Security Notes January ‘19: First Critical Note for SAP Cloud Connector and Mobile Patching SAP SECURITY NOTES JANUARY ‘19: FIRST CRITICAL NOTE FOR SAP CLOUD CONNECTOR AND MOBILE PATCHING

blog article

Jan 08, 2019

Today is the first SAP Security Patch Day for 2019 and 18 security notes were released, including one that was published during the month after the last Patch Day. This month, several platforms that are not usually part of the Patch Day have Security Notes published, including SAP Cloud Connector an...

Read More

Introducing the Defender INTRODUCING THE DEFENDER'S DIGEST

blog article

Jan 07, 2019

With cyberattackers actively targeting SAP and Oracle ERP systems and more organizations experiencing breaches, the ERP cybersecurity industry is constantly changing. Staying up to date with best practices can be a struggle. Onapsis would like to introduce the Defender’s Digest, a new monthly ...

Read More

New Year – Mastering Privacy and Data Security in 2019 NEW YEAR – MASTERING PRIVACY AND DATA SECURITY IN 2019

blog article

Jan 07, 2019

Privacy Compliance & Data Security - A Fox Rothschild Blog. 2019 presents businesses with new cybersecurity and privacy challenges: rapid advances in technology, sophisticated new cyberattacks and stricter privacy regulations here and around the world, just to name a few. Businesses that fail to...

Read More

Here are some predictions for the new year HERE ARE SOME PREDICTIONS FOR THE NEW YEAR

blog article

Jan 07, 2019

Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutions, it would be best if you took a step back to analyze a few predictions and trends that may i...

Read More

The Difference Between Data Privacy and Data Security THE DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY

blog article

Jan 07, 2019

Repeat after me, data security is not privacy. Privacy is also not data security. These two terms are often used interchangeably, but there are distinct differences as well as similarities. Yes, data security and privacy have a common goal to protect sensitive data. But they have very different appr...

Read More

How to Improve Blockchain Security HOW TO IMPROVE BLOCKCHAIN SECURITY

blog article

Jan 07, 2019

In 2014, Mt. Gox, one of the largest cryptocurrency exchanges (managing approximately 70% of all transactions in Bitcoin) had been the victim of successful hacking attempts for a period of three years, and Mt. Gox’s customers lost 750,000 Bitcoins. Bitcoin lost over a third of its value when t...

Read More

How To Pick A Data Backup Method For Your Enterprise HOW TO PICK A DATA BACKUP METHOD FOR YOUR ENTERPRISE

blog article

Jan 07, 2019

The digital age is all about data security and privacy, but that doesn’t mean businesses and private individuals have much of a clue when it comes to properly back up their information. Despite the fact that finding the right data backup method isn’t always a breeze, it doesn’t hav...

Read More

3 Top Cybersecurity Stocks to Buy in 2019 3 TOP CYBERSECURITY STOCKS TO BUY IN 2019

blog article

Jan 07, 2019

Okta (NASDAQ:OKTA) is the leading provider of enterprise identity-management services. More than 5,600 businesses rely on Okta to manage and secure the digital access rights to their network. Think passwords, login processes, and employee on- and off-boarding procedures. Okta makes all this simpler ...

Read More

VPN vs Antivirus: Which is a Bigger Cyber Security Market and Which Does Your Company Need? VPN VS ANTIVIRUS: WHICH IS A BIGGER CYBER SECURITY MARKET AND WHICH DOES YOUR COMPANY NEED?

blog article

Jan 07, 2019

With cyber security being the rage these days, choosing out of the many programs that are popping up with the promise of offering optimal protection becomes a dilemma. Even more, the choice between picking out a recommended antivirus and sticking with the more traditional way of protecting your comp...

Read More

This Era Strongly Demands for Advanced Security Solutions – Let’s See Why THIS ERA STRONGLY DEMANDS FOR ADVANCED SECURITY SOLUTIONS – LET’S SEE WHY

blog article

Jan 07, 2019

In today era of 2019, companies are turning towards advanced security solutions because of the surging in data breaches. Lots of updation and intelligence systems are required in monitoring products for malware protection and to perform auto defensive actions. This post is going to aware readers tha...

Read More

MICROSOFT EXCHANGE SERVER VULNERABLE TO EXPLOIT FROM A SIMPLE EMAIL MICROSOFT EXCHANGE SERVER VULNERABLE TO EXPLOIT FROM A SIMPLE EMAIL

blog article

Jan 07, 2019

The remote code execution vulnerabilities (CVE-2019-0547 and CVE-2019-0586), according to Microsoft, exist in Microsoft Exchange software when the software fails to properly handle objects in memory. They can be exploited by merely sending an email to a vulnerable server. An attacker who successfull...

Read More

Considering Cyber Insurance in the Aftermath of the NotPetya Attack CONSIDERING CYBER INSURANCE IN THE AFTERMATH OF THE NOTPETYA ATTACK

blog article

Jan 07, 2019

It’s been 18 months since June 2017 when the Petya/NotPetya cyber attacks fell on businesses around the globe, resulting in a dramatic loss of income and intense business disruption. Has cyber insurance limited the fallout for the victims of the ransomware attacks, and should proactive busines...

Read More

Managing Cybersecurity Risk and a Framework for Making Investments MANAGING CYBERSECURITY RISK AND A FRAMEWORK FOR MAKING INVESTMENTS

blog article

Jan 04, 2019

Everyone agrees that core protection tools are necessary from a risk management and compliance standpoint, but what about adding new programs to reduce your cyber risk? Quantifying your cyber risk is difficult but necessary to establish a prudent financial evaluation and planning process that provid...

Read More

Cloud cyber security required by 70% of firms CLOUD CYBER SECURITY REQUIRED BY 70% OF FIRMS

blog article

Jan 04, 2019

Cloud computing has transformed the way small to medium sized (SME) companies purchase and use IT services in the last five years. It is estimated that 70% of all firms in the US and Europe use at least one business-critical cloud application. The cloud delivers simplified IT management, remote acce...

Read More

5 BUSINESS SECURITY QUESTIONS ASKED AND ANSWERED 5 BUSINESS SECURITY QUESTIONS ASKED AND ANSWERED

blog article

Jan 03, 2019

Operating a business security system can be challenging, especially for new users. As a business owner, you don’t have a lot of extra time to troubleshoot your system. To prevent your security solution from taking away from valuable business operations, we’ve answered five fundamental qu...

Read More

The 4 stages of cyber resilience THE 4 STAGES OF CYBER RESILIENCE

blog article

Jan 03, 2019

Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either repelled the attack or faced the consequences head-on. However, with data breaches becoming more common a...

Read More

The Surprising Role Of AI In Cybercrime THE SURPRISING ROLE OF AI IN CYBERCRIME

blog article

Jan 03, 2019

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active rol...

Read More