Top

Category: Featured


Featured

Vulnerable or Not? How Your Employees Respond to Cyber Threats

May 18, 2018

Via: James Hughes

With the risk of a cyberattack now being classified as the top threat to organizations, companies all around the globe are still hesitant to spend money to improve their security systems or train their employees. Security threats can put an […]


Featured

4 Common Ways Your Employees Can Compromise Your Security

May 2, 2018

Via: William Palmer

Even though cybersecurity solutions are becoming increasingly sophisticated, hackers are still managing to keep up even with the most advanced technologies. Furthermore, companies get so caught up in trying to adopt new technologies in their endless search for 100% protection […]


Email security, Featured

Why Phishing Is Still Your Number One Security Foe

April 3, 2018

Via: James Hughes

91% of cyberattacks start with a phishing email. Why are they still so prevalent – and successful? It seems like every day another high-ranking employee falls for a scam and loses millions in company money. How long have security experts […]


Featured

All You Need to Know About the Data Protection Officer

March 16, 2018

Via: Michael Boyd

The EU’s General Data Protection Regulation will take effect in May 2018. The Regulation governs the privacy practices of any company processing EU citizens’ data, whether or not that company is located in the EU. One of the GDPR’s requirements […]


Featured

Combatting the Growing Threat of Ransomware

February 14, 2018

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]


Featured

How to Safeguard Your Mac from Malware

January 26, 2018

Via: Sofia Allende

You think your Mac is safe from malware? Think again. While Macs do have some integrated protection against malware, they can still get infected. The good news? According to SecureMac.com, “even as Trojan Horses, adware, and other types of malware […]


Featured

The Makings of a Great Incident Management Process

December 20, 2017

Via: Michael Boyd

The importance of incident management is increasing. We’ve gotten to the point where every company, regardless of size, needs to have a proper Incident Management Process implemented. Why is it so important?   Simply because no one is exempt from […]


Featured

5 Types of Highly Effective Hackers & How to Avoid Becoming Their Target

November 24, 2017

Via: Sofia Allende

Are cyber-threats keeping you up at night? You are not alone, dear reader. As hackers have become more skilled, there has been a rise in the number, severity and sophistication of cyber-attacks inflicting organizations of all sizes, all around the […]


Featured

Passwords & Email Accounts: a Gateway for Hackers

October 25, 2017

Via: Sofia Allende

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” – Richard Clarke While the former National Coordinator for Security for the United States does make a valid point […]


Featured

Information Security Spending Is Growing. What Businesses Need to Know

September 10, 2017

Via: Jeremy Corkwell

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity […]