Articles
-
Articles
Email Phishing Increasing - But It's Not All Gloom and Doom
The report, Email Security Risk Assessment, found that companies are largely still not great at detecting phishing attacks.
Read moreJuly 11, 2018
-
Articles
Keeping Your Social Media Secured During Social Media Crises
With the never-ending siege of breaches and hacks, recent incidents are reminders of just how vulnerable our personal data is.
Read moreJuly 10, 2018
-
Articles
Misconfigured Device Exposes Transcriptions of More Than 2,300 Medical Providers
In a recent case involving a Kansas-based medical transcription services company, it was misconfiguration of a server by employees that caused information of more than 2,300 physicians and other providers to be exposed and up for grabs for anyone wanting to take a peek.
Read moreJuly 09, 2018
-
Articles
Tips for Securing Your Mobile Devices
Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information.
Read moreJuly 05, 2018
-
Articles
Recovering from a Mega Breach - First Steps
Equifax, Target, JP Morgan Chase, Home Depot, Saks Fifth Avenue – the list of mega corporate hacks goes on and on, and on. A total of 396.5 million identities were impacted from these five corporate giants alone.
Read moreJuly 02, 2018
-
Articles
Chrome Gets a Malware Catching Boost With Help From Microsoft
Microsoft has released an extension for Chrome that will help further prevent phishing attacks from becoming successful
Read moreJune 29, 2018
-
Articles
Corporate Fight Against Cybercrime Working, But Work Still To Be Done
After years of being cybercrime victims, corporations have been fighting back with enhanced cybersecurity measures.
Read moreJune 27, 2018
-
Articles
Assessment of Mobile and Online Banking Vulnerabilities
It’s a sad fact that your (or anyone’s) banking app may be one of the 87% banking apps that couldn’t pass muster against hackers.
Read moreJune 22, 2018
-
Articles
How a Single Click Can Infect Your Company's Network
Unfortunately, browsing at the office has become more of a risk lately due to various factors arising from the cybercriminal world.
Read moreJune 20, 2018
-
Articles
How IDS and IPS Can Affect External Penetration Testing
It would seem obvious that an IPS is a vital part of an organization’s security program, given how useful it can be for preventing malicious attacks, particularly during the initial scanning and probing phases. In order to understand how this conflicts with a penetration test, we must look at how a penetration test compares to and differs from a real-world attack.
Read moreJune 14, 2018