3 Foolproof Tips to Securely Complete Online Transactions

3 Foolproof Tips to Securely Complete Online Transactions

Most users think they’re savvy enough to shop securely online, but even the most security-minded and Internet-knowledgeable shoppers have been duped when making business purchases. Wise users need to overcome their over-confidence and brush up on online shopping best practices to avoid getting taken by a suave scammer.

Read More

5 Ways to Improve Your Cybersecurity Posture in 2019

5 Ways to Improve Your Cybersecurity Posture in 2019

On average, a ransomware attack costs a company $5 million, resulting in system downtime and productivity loss. There has also been a noticeable increase in the reach of compliance requirements. With the cost of cyber-attacks skyrocketing, it’s critical to re-examine how cybersecurity resources are being allocated. These 2019 trends build upon classic security best practices with a focus on next-generation implementation, adoption, and technologies.

Read More

7 Commonly Neglected Security Tasks: DMARC, DNS calls, and More

7 Commonly Neglected Security Tasks: DMARC, DNS calls, and More

In this age of digital transformation, IT staff are under incredible pressure to keep up with the breakneck speed of new technology adoption, implementation, and management while trying to maintain usability, productivity, and efficiency. With this reality, something has got to give, and oftentimes what falls off the radar are security tasks.

Read More

Fixing the People Problem: Why Security Awareness Should Come First

Fixing the People Problem: Why Security Awareness Should Come First

It happens all too often. Imagine a Human Resources (HR) assistant receives an email from the CFO requesting an update to the companies account and routing number. The email appears to be legitimate and the diligent employee rushes to handle the CFOs request only to discover later it was a phishing email. These types of social engineering attacks have become increasingly sophisticated and difficult to detect. So what are your employees supposed to do?

Read More

A Look Inside the Cybercrime-as-a-Service Industry

A Look Inside the Cybercrime-as-a-Service Industry

There’s a skills-gap and specialist shortage in the cybercrime industry. You read that correctly. Cybercriminals are looking for new recruits to fill positions in the rapidly growing cybercrime as a service (CaaS) industry. Although it sounds like something out of a low-budget science fiction flick, CaaS is very real and thriving.

Read More

5 Big Data Breach Myths the Hackers Don't Want Exposed

5 Big Data Breach Myths the Hackers Don't Want Exposed

We all have sneaking suspicions about security, but as with all assumptions, some of these beliefs are actually myths. And they’re myths that hackers hope stay around as long as Nessie and Yetis. Separating reality from fairytale can help you keep your organization secure.

Read More

Components of Cyber Resilience Part 3: Thinking Beyond Risk Management

Components of Cyber Resilience Part 3: Thinking Beyond Risk Management

In our two previous posts on cyber resilience (CR)—how you manage operational risk and protect your assets—we explored how a holistic approach is best practice for a security-minded organization. Continuing to build on that knowledge foundation, this third part in the series explores risk management, external dependencies management, training and situational awareness.

Read More

Why Auditing External Service Providers Is A Must

Why Auditing External Service Providers Is A Must

Networks are often protected with security implementations that are developed using external service providers. So, how are you supposed to know if these providers have compromised your data? How do you go about auditing the security posture of external service providers? Here are a few best practices to help examine your risk exposure and, if necessary, take action.

Read More

Business Email Compromise Attacks Explained

Business Email Compromise Attacks Explained

Business email compromise (BEC) attacks are increasing at a staggering rate. These social engineering attacks are cleverly disguised and can fool even the best of them. So, what exactly is a BEC attack and how can you protect your company from falling victim?

Read More