Tag "Cyber Threat"

Back to homepage
Hardware/Network

What Your Organization Needs To Know To Undergo A Secure Digital Transformation

Just about every company today is going through some type of digital transformation, whether migrating entire departments and data centers to the cloud, opting for cloud-based SaaS solutions over legacy, on-prem software,

Hardware/Network Mobile

Personal mobile devices are the biggest threat to your network

Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk

Industry Insights

The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant

 When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention

Software

Password inadequacy remains a top threat

New research from the WatchGuard Threat Lab revealed that 50 percent of government and military employee LinkedIn passwords were weak enough to be cracked in less than two days. This

Identity Theft

Identities Are The New Security Perimeter

There’s been a 135% year-over-year increase in financial data for sale on the Dark Web between the first half of 2017 and the first half of 2018. The Dark Web is now

Cloud Software

Cloudy With a Chance of Cryptojacking

A growing trend amongst cyber-criminals is cloudjacking: the act of stealing processing and storage from someone else’s cloud account.  Many are combining this practice with cryptojacking to further boost their

Industry Insights

Why Businesses Must Re-Educate On Cybersecurity Policies

A lack of employee education, overlooking patch management and flouting security processes are leaving business vulnerable and posing a threat to network security and data protection. According to a government

Software

The real-life consequences of cryptocurrency hoarding

Ever since the Bitcoin boom, cryptocurrency has become a global phenomenon, and it’s here to stay. Unlike fiat currencies, cryptocurrency isn’t regulated by a central bank or government. Consequently, anyone

Software

The primary email security challenge enterprises face is trust

Only 34 percent of users without email security responsibility recall seeing email-based attacks in their inboxes, compared to 85 percent of email security professionals, according to GreatHorn.Throughout June 2018, 295 business professionals

Industry Insights

Breach Accountability: Blaming the CISO vs An End to Shaming

Should a CISO carry the can if a business suffers damage from a hacking attack? This question must sit in the back of the average CISO’s mind more and more