Web-based Application Security: Part 2: Cross-Site Forgery

Web-based Application Security: Part 2: Cross-Site Forgery

Cross-site forgery (CSRF) is a malicious technique designed to take advantage of unsuspecting users who are actively logged into web applications. Learn more about this threat to your data and how to safeguard against it ... Read More
Web-based Application Security Part 1: Open Redirection Vulnerability

Web-based Application Security Part 1: Open Redirection Vulnerability

Understanding open redirection vulnerabilities is key to detecting them and protecting your organization’s data. Without proper validation, attackers can redirect victims from trusted to malicious sites, or use forwards to access unauthorized pages ... Read More
Employee Cybersecurity Survey Infographic

[Infographic] Employees are Cyber Secure in Theory, But Not in Practice

| | Compliance
Cybersecurity is a top priority for organizations. All it takes to infect a network or steal valuable data, is one wrong click by an employee. While employees seem to have good knowledge of basic cybersecurity practices, there are considerable security blind spots which leave the employee and organization vulnerable to ... Read More
Spear-Phishing: The Smart Malware

Spear-Phishing: The Smart Malware

| | Compliance
"Spear-phishing" is a smart phishing mechanism that is an increasingly popular and virulent malware vector. Understand its devastating effect on organizations worldwide and get pointers to safeguard your organization against it ... Read More
Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization's best defense is to plan for business continuity and disaster recovery by using processes that guide organizations to possibly prevent and/or ... Read More
Gone Phishing

Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data

Phishing is a critical security issue that can trick even the most diligent, security-minded users. How do you protect your organization from being another phish in the sea? Let’s start by understanding how phishing works and then move on to practical pointers to avoiding biting the bait ... Read More
A data graphic showing that workers would rather be "nice" than safe when analyzing willingness to share passwords or personal computers.

How Are You Celebrating National Security Awareness Month?

This October is the 15th annual National Cybersecurity Awareness Month (NCSAM), an initiative to raise awareness about the importance of cybersecurity that grows stronger by the year in significance and scope. This is no surprise given that breaches and malware attacks are getting more frequent, and they don’t discriminate against ... Read More
White Paper How Can Schools Protec Their Data

Learning Held Hostage – How to Prepare for and Prevent Data Loss Due to Ransomware

| | education, Ransomware
At the beginning of 2018, the FBI and the Department of Education Inspector General revealed that hackers had tried to sell over 100 million private records from almost 100 schools and businesses as of the end of last year. 100 million records seems like a lot, but when you consider ... Read More
California data security law GDPR

GDPR 2.0 Comes to the United States

| | Compliance, GDPR
On June 28 2018, California Governor Jerry Brown signed into law AB 375, the California Consumer Privacy Act (CCPA) of 2018. The statute, seen as one of the toughest privacy laws in the United States, will require companies to tell California residents what information is being collected and how it’s ... Read More

Prepare or Repair: Pointers for Both Sides of a Ransomware Attack

Ransomware attacks are increasing, getting more sophisticated and sparing no industry. In this blog we examine both sides of a ransomware attack — ways to prepare a solid defense (or offense) to prevent an attack and pointers to repair the damage if you do suffer an attack ... Read More
Loading...