Flawed Mobile Voting App Highlights Need For Proper Testing

By Michelle Drolet . 11 Mar 2020

When apps are developed in a hurry and not properly put through their paces, the risk of something going wrong is high, as the Iowa Democratic Party just learned to its cost. Creating secure, fully functional mobile apps takes time and requires stringent testing. In the aftermath of the delayed results for Iowa’s Democratic presidential caucuses, it … Continue reading Flawed Mobile Voting App Highlights Need For Proper Testing

10 Basic And Easy Cybersecurity Steps

By Michelle Drolet . 18 Feb 2020

Is cybersecurity a top priority for your business? We certainly hope so. A recent report revealed that almost 64% of all businesses prioritize IT security above everything else. Even 80% of all SMBs rank IT security as a top business priority. The Impact Of Cybercrime Can Be Far-Reaching A successful cyberattack can damage your company beyond repair. This could … Continue reading 10 Basic And Easy Cybersecurity Steps

Protect Yourself From Ad Threats And ‘Malvertising’

By Michelle Drolet . 3 Feb 2020

Record numbers for internet sales were reported in 2019, but online retailers aren’t the only ones laughing all the way to the bank. Cybercrime costs retailers a staggering $30 billion a year, and the sector is among the top ones targeted globally. Last year, three quarters of global retailers reported falling victim to cyberattacks.   A New Attack Method Emerges: Ad Threats Cyberattackers … Continue reading Protect Yourself From Ad Threats And ‘Malvertising’

The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

By Michelle Drolet . 14 Jan 2020

2019 is set to break a record for the highest number of security incidents ever recorded and probably the biggest and most expensive year in terms of data breach fines, penalties and court settlements. While large-scale breaches always make big headlines, hackers are not sparing small businesses and consumers. As we head into the new decade, cyberattacks will continue … Continue reading The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

By Michelle Drolet . 7 Oct 2019

One of the biggest challenges about working in cybersecurity is that you’re facing an enemy who learns and adapts. Cybercriminals can be very organized, they cooperate, and they’re constantly working to develop new techniques and strategies that will breach your defenses. They’re also growing increasingly adept at sniffing out the best opportunities to extract maximum … Continue reading The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

Top Social Media Scams And How To Avoid Them

By Michelle Drolet . 9 Sep 2019

Social media has completely changed the way humans interact. Our lives have become increasingly public as we all share a variety of personal information online on various social networks. 2019 has seen worldwide social media user numbers grow to almost 3.5 billion, with 288 million new users in the past 12 months, pushing the global social … Continue reading Top Social Media Scams And How To Avoid Them

Seven Tips For A Successful Security Awareness Training Program

By Michelle Drolet . 16 Aug 2019

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human”— it’s obvious that as humans we often … Continue reading Seven Tips For A Successful Security Awareness Training Program

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

By Michelle Drolet . 8 Jul 2019

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period … Continue reading Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

Passing The Cybersecurity Baton To A vCISO

By Michelle Drolet . 17 Jun 2019

Businesses continue to face modern cyber attacks such as ransomware threats and data breach incidents. In the wake of a non-stop onslaught from advanced hackers, it seems that no matter what defensive measures organizations put in place, cyber adversaries and malware authors are able to circumvent them. Cybercriminals are not only motivated to target high-profile … Continue reading Passing The Cybersecurity Baton To A vCISO

Operationalizing Cybersecurity: Evolution, Seamlessness And Holistic Thinking As Key Drivers

By Michelle Drolet . 9 May 2019

When we say “operationalizing cybersecurity,” what we are essentially saying is the implementation of best practices that strengthen your cybersecurity infrastructure. This results in a strong security posture able to address advanced and continuously evolving cyberthreats leveled at any organization. A well-defined cybersecurity strategy lies at the very root of seamless operationalizing. Key stakeholders like … Continue reading Operationalizing Cybersecurity: Evolution, Seamlessness And Holistic Thinking As Key Drivers

Tags