1.888.900.DRIZ (3749)
  • Under DDoS Attack?
  • Contact
Driz Group
  • Managed Services
    • DDoS Protection
    • Vulnerability Assessment
    • Virtual CISO
  • Compliance
    • Consulting
    • SSAE16 SOC2
    • GDPR
  • About us
    • Testimonials
    • Meet the Team
  • Resources
    • Cybersecurity News
    • Incident Management Playbook
    • Cybersecurity Roadmap
  • Blog
Select Page
What Can Organizations Learn from the Marriott Data Breach

What Can Organizations Learn from the Marriott Data Breach

by Steve | Dec 5, 2018 | Cybersecurity, Data Breach

What Can Organizations Learn from the Marriott Data Breach The recent data breach disclosure by Marriott is an eye-opener to organizations, not only because of the extent of the breach – with up to half a billion guests affected, but also because of the length...

How to Prevent Departing Employees from Departing with Your Organization’s Data

by Steve | Jul 15, 2018 | Cybersecurity, Data Leak Prevention

How to Prevent Departing Employees from Departing with Your Organization’s Data 85% said they took data they’ve created themselves and feel that is the right thing to do. ​The practice of departing employees departing with their employers’ data has recently been...

What is Remote Code Execution Attack & How to Prevent this Type of Cyberattack

by Steve | Jun 16, 2018 | Cyber Attack, Cybersecurity

What is Remote Code Execution Attack & How to Prevent this Type of Cyberattack Microsoft recently rolled out its latest security update, fixing 50 security vulnerabilities. Out of the 50 security vulnerabilities fixed by Microsoft in its June 12thsecurity update,...

Are You Failing to Protect Yourself Against Fraud?

by Steve | May 1, 2018 | Cybersecurity, Fraud

Are You Failing to Protect Yourself Against Fraud? Online fraud is, sadly, a common danger. More than 15 million people fell victim to it in 2016, and the risk is still very much present. Companies across all areas of industry must take steps to protect their...

Top 7 Cyber Security Tools for Your Business

by Steve | Oct 4, 2017 | Cyber Security Risk, Cybersecurity, Vulnerability

Top 7 Cyber Security Tools for Your Business With so much of our information online, everyone is vulnerable to hackers and cyber-thieves. When it comes to business, a cyber invasion is a constant threat. Short term loss could be financial, intellectual property theft,...

New Bluetooth Malware Puts Billions of Devices at Risk

by Steve | Sep 15, 2017 | Cyber Security Risk, Cyber Security Threats, Cybersecurity

New Bluetooth Malware Puts Billions of Devices at Risk ​A new malicious software dubbed as “BlueBorne” puts billions of Bluetooth-enabled devices at risk.  Understanding Bluetooth ​Dr. Jaap Haartsen invented the Bluetooth while working at Ericsson in the 1990s....
« Older Entries

Recent Posts

  • NASA Data Breach May Have Put Personnel Information at Risk January 16, 2019
  • Mirai Botnet Operator Responsible for Cutting Off Internet Access of an Entire Country Jailed January 16, 2019
  • Cyber Attack Disrupts Operations of Major U.S. Newspapers January 3, 2019
  • What Can Organizations Learn from the Marriott Data Breach December 5, 2018
  • New Mirai Variant Hijacks Enterprise Linux Servers for DDoS Attacks November 28, 2018

Categories

  • Bots
  • Cloud Security
  • Compliance
  • Cryptocurrency
  • Cyber Attack
  • Cyber Espionage
  • Cyber Security
  • Cyber Security Consulting
  • Cyber Security Insurance
  • Cyber Security Risk
  • Cyber Security Threats
  • Cybersecurity
  • Data Breach
  • Data Leak
  • Data Leak Prevention
  • DDoS
  • Email Security
  • Fraud
  • GDPR
  • Hacking
  • IoT
  • Malware
  • Mobile Security
  • Network Security Threats
  • Phishing Attack
  • Privacy
  • Ransomware
  • Risk
  • Uncategorized
  • Virtual CISO
  • Vulnerability
  • Vulnerability Assessment
  • Web Application Firewall
  • Web Application Protection
  • Web Application Security
  • Web Protection
  • Facebook
  • Twitter
  • Google

Copyright Driz Group Inc. All rights reserved.

Privacy Policy