Since our business is focused on Security, we talk a lot about the threat landscape. Many attacks are focusing on password stealing. Once an attacker has legitimate credentials the attack surface widens greatly.
Vulnerability scanning, the inspection of the network to detect any potential areas prone to exploit, is an essential part of a strong security posture. But how do you know if the type of scans you’re running, or the frequency of the scans is enough to protect your network?
Machine learning and artificial intelligence are some of the biggest buzzwords in IT today, but before you jump on the bandwagon and trade in your old tech, there are a few things you should consider.
I recently read Carbon Blacks “Global Incident Response Threat Report” regarding the topic of Island Hopping. If you are not familiar with the term, it’s the act of a hacker gaining access to a network and then infiltrating the supply chain to gain access to clients...
Perhaps It should be called “Lack of Support”
Vendor monitoring is an essential part of keeping your business and data safe. To be most effective, monitoring must happen in real-time, not point in time.
Ransomware is a type of malware that holds a computer or data for ransom, requiring payment for the return of the data or control of the computer.
What once required a careful crawl through the dark web is now available on Fiverr. Anyone can hire a hacker to recover accounts or lost passwords, change your university grades, access a phone or even get into a corporate email account.
Zero trust security has gained traction in recent years but has been difficult for large organizations to implement.
Whether your business has only one location or is a multinational corporation, company culture matters, especially in the case of cybersecurity. When security is treated as a priority from the top down and in every office location, it has the best chance of successfully fending off attacks.
Rather than relying on the cloud or data centers, computing is now done at or near the source of the data, otherwise known as the edge. While the cloud is being leveraged for storage and computing power, things have become centralized. But distance can mean latency. Edge computing provides an answer.
If you have previously passed on backing up to the cloud because of price and functionality, it’s time to take a fresh look.
This is becoming one of my favorite phishing scams. Not just because it’s hilariously worded, but because the sender isn’t even putting in the effort to create malware, create a malicious site, or gain control over your account in any way.
The cost of prevention is much cheaper than the fallout related to an actual hack. Learn more now.