Five Things To Keep In Mind Before Adopting A Zero Trust Security Approach

By Michelle Drolet . 5 Jun 2020

The COVID-19 pandemic has brought about a seismic shift in how the world goes to work. Apart from essential services, remote work is the new normal, mandated everywhere — even in organizations that never previously offered remote work options. Lack of VPN infrastructure or its ability to scale, legacy systems that were never designed for remote work, … Continue reading Five Things To Keep In Mind Before Adopting A Zero Trust Security Approach

Securing Your Remote Workforce In The New Norm

By Michelle Drolet . 5 May 2020

These are unprecedented times. As companies scramble for business continuity, millions of workers around the world are forced to adapt to a workplace culture dubbed as the world’s largest work-from-home experiment. But there is a steep price to be paid for this change — weakened cybersecurity. With more and more people working from home, the attack … Continue reading Securing Your Remote Workforce In The New Norm

Tips For Setting Up A Cybersecure Response Plan

By Michelle Drolet . 1 Apr 2020

As the novel coronavirus (which causes COVID-19) continues to spread around the world, businesses must do what they can to prepare for absent staff and possible periods of enforced closure. In general, it’s vital that companies of all sizes and types draft a distinct crisis response plan because existing disaster recovery plans or business continuity … Continue reading Tips For Setting Up A Cybersecure Response Plan

Flawed Mobile Voting App Highlights Need For Proper Testing

By Michelle Drolet . 11 Mar 2020

When apps are developed in a hurry and not properly put through their paces, the risk of something going wrong is high, as the Iowa Democratic Party just learned to its cost. Creating secure, fully functional mobile apps takes time and requires stringent testing. In the aftermath of the delayed results for Iowa’s Democratic presidential caucuses, it … Continue reading Flawed Mobile Voting App Highlights Need For Proper Testing

10 Basic And Easy Cybersecurity Steps

By Michelle Drolet . 18 Feb 2020

Is cybersecurity a top priority for your business? We certainly hope so. A recent report revealed that almost 64% of all businesses prioritize IT security above everything else. Even 80% of all SMBs rank IT security as a top business priority. The Impact Of Cybercrime Can Be Far-Reaching A successful cyberattack can damage your company beyond repair. This could … Continue reading 10 Basic And Easy Cybersecurity Steps

Protect Yourself From Ad Threats And ‘Malvertising’

By Michelle Drolet . 3 Feb 2020

Record numbers for internet sales were reported in 2019, but online retailers aren’t the only ones laughing all the way to the bank. Cybercrime costs retailers a staggering $30 billion a year, and the sector is among the top ones targeted globally. Last year, three quarters of global retailers reported falling victim to cyberattacks.   A New Attack Method Emerges: Ad Threats Cyberattackers … Continue reading Protect Yourself From Ad Threats And ‘Malvertising’

The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

By Michelle Drolet . 14 Jan 2020

2019 is set to break a record for the highest number of security incidents ever recorded and probably the biggest and most expensive year in terms of data breach fines, penalties and court settlements. While large-scale breaches always make big headlines, hackers are not sparing small businesses and consumers. As we head into the new decade, cyberattacks will continue … Continue reading The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

By Michelle Drolet . 7 Oct 2019

One of the biggest challenges about working in cybersecurity is that you’re facing an enemy who learns and adapts. Cybercriminals can be very organized, they cooperate, and they’re constantly working to develop new techniques and strategies that will breach your defenses. They’re also growing increasingly adept at sniffing out the best opportunities to extract maximum … Continue reading The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

Top Social Media Scams And How To Avoid Them

By Michelle Drolet . 9 Sep 2019

Social media has completely changed the way humans interact. Our lives have become increasingly public as we all share a variety of personal information online on various social networks. 2019 has seen worldwide social media user numbers grow to almost 3.5 billion, with 288 million new users in the past 12 months, pushing the global social … Continue reading Top Social Media Scams And How To Avoid Them

Seven Tips For A Successful Security Awareness Training Program

By Michelle Drolet . 16 Aug 2019

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human”— it’s obvious that as humans we often … Continue reading Seven Tips For A Successful Security Awareness Training Program

Tags