by Steve | Dec 5, 2018 | Cybersecurity, Data Breach
What Can Organizations Learn from the Marriott Data Breach The recent data breach disclosure by Marriott is an eye-opener to organizations, not only because of the extent of the breach – with up to half a billion guests affected, but also because of the length...
by Steve | Jul 15, 2018 | Cybersecurity, Data Leak Prevention
How to Prevent Departing Employees from Departing with Your Organization’s Data 85% said they took data they’ve created themselves and feel that is the right thing to do. The practice of departing employees departing with their employers’ data has recently been...
by Steve | Jun 16, 2018 | Cyber Attack, Cybersecurity
What is Remote Code Execution Attack & How to Prevent this Type of Cyberattack Microsoft recently rolled out its latest security update, fixing 50 security vulnerabilities. Out of the 50 security vulnerabilities fixed by Microsoft in its June 12thsecurity update,...
by Steve | May 1, 2018 | Cybersecurity, Fraud
Are You Failing to Protect Yourself Against Fraud? Online fraud is, sadly, a common danger. More than 15 million people fell victim to it in 2016, and the risk is still very much present. Companies across all areas of industry must take steps to protect their...
by Steve | Oct 4, 2017 | Cyber Security Risk, Cybersecurity, Vulnerability
Top 7 Cyber Security Tools for Your Business With so much of our information online, everyone is vulnerable to hackers and cyber-thieves. When it comes to business, a cyber invasion is a constant threat. Short term loss could be financial, intellectual property theft,...
by Steve | Sep 15, 2017 | Cyber Security Risk, Cyber Security Threats, Cybersecurity
New Bluetooth Malware Puts Billions of Devices at Risk A new malicious software dubbed as “BlueBorne” puts billions of Bluetooth-enabled devices at risk. Understanding Bluetooth Dr. Jaap Haartsen invented the Bluetooth while working at Ericsson in the 1990s....