10 things I know about… Public Wi-Fi

By Michelle Drolet . 2 May 2017

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers. 9. Sign me up By default, most mobile phones/devices are set to ask your permission to join a network. Once you obtain credentials, the known network will join your phone automatically. 8. Sniffing … Continue reading 10 things I know about… Public Wi-Fi

6 Ways to Launch a Targeted Cyberattack

By Michelle Drolet . 14 Feb 2017

What you need to know to defend against targeted attacks. The threat of a targeted attack for any business is real and substantial. It’s vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to keep your data safe. Consider that, on average, attackers are … Continue reading 6 Ways to Launch a Targeted Cyberattack

Michelle Drolet Talks to tED Magazine about How Companies Can Prepare for a Security Breach

By Michelle Drolet . 4 Jan 2017

Our own Michelle Drolet sits down with tED Magazine to discuss what security measures companies can take to protect their data. Read the full article >    

How Much Does a Data Breach Actually Cost?

By Michelle Drolet . 28 Oct 2016

The average cost of a data breach involving fewer than 10,000 records was $5 million The American public has become so inured to data breaches that it’s difficult to remember them all. Infamous breaches like the ones at Target and Sony become almost forgettable when confronted with the recently disclosed half-billion accounts compromised at Yahoo … Continue reading How Much Does a Data Breach Actually Cost?

Does the NSA have a duty to disclose zero-day exploits?

By Michelle Drolet . 26 Sep 2016

The NSA should disclose all zero-day exploits. But it doesn’t.   To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.” … Continue reading Does the NSA have a duty to disclose zero-day exploits?

Cybersecurity is only as strong as your weakest link—your employees

By Michelle Drolet . 28 Jul 2016

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17   You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most … Continue reading Cybersecurity is only as strong as your weakest link—your employees

LinkedIn Data Breach Still Causing Problems

By Michelle Drolet . 21 Jun 2016

Failing to take basic security precautions with website passwords puts your data at risk   Do you remember back in 2012 when LinkedIn was hacked? Around 6.5 million user passwords were posted on a Russian blog. There was a mandatory password reset for affected users, and LinkedIn released a statement advising people to enable two-step … Continue reading LinkedIn Data Breach Still Causing Problems

8 Tips to Secure Those IoT Devices

By Michelle Drolet . 20 Jun 2016

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace   As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush … Continue reading 8 Tips to Secure Those IoT Devices

5 InfoSec concerns for colleges and universities

By Michelle Drolet . 14 Jun 2016

Higher education institutions are a prime target for cybercriminals, and IT needs resources to prevent attacks and provide a proper level of security   No industry or sector is immune to data breaches, but some are targeted more often than others. Education came ahead of government, retail and financial sectors, and it was second only … Continue reading 5 InfoSec concerns for colleges and universities

3 Ways to Protect Data and Control Access to It

By Michelle Drolet . 23 May 2016

Your company’s data is its crown jewels, and you must protect it all times. CIS Controls 13, 14 and 15 will help you.   Earlier we delved into disaster recovery and network security. Now it’s time to take a look at Critical Security Controls 13, 14 and 15, which cover data protection and access control. The … Continue reading 3 Ways to Protect Data and Control Access to It

Tags