As Pandemic-Related Traps Spawn Cyberattacks, How Ready Are You?
As COVID-19 crisis progresses, Cybersecurity remains essential to the state of business operations. Many of the largest enterprises are greatly affected. Enterprises are shutting down or drastically reducing business operations as the number of persons infected by the virus worldwide continues to climb. With all the shadows of fear and ... Read More
CYBER ATTACKS: World Economic Forum Says It’s a Top Concern, But Not Everyone Thinks So
The heightened risk of cyberattacks has the World Economic Forum warning large enterprises and those maintaining critical infrastructure that they best have an approach to addressing the matter of cyberattacks before a devastating event occurs. According to their findings, cyber-attacks are the second most concerning risk to global enterprises for ... Read More
Heighted Attacks Force Utility Companies to Rethink Security
New threats have emerged and are increasingly targeting controllers found in power plants and electric grids, provoking grave concern for utility company security and critical infrastructure (CI). Unfortunately, policy-based monitoring and network anomaly detection alone has proven to be insufficient, even with intelligent automated services and 'unique' integrity checks offered ... Read More
In the Face of a Ransomware Attack, Can Your Defenses Prevail?
As the fastest growing malware threat, ransomware attacks are trending high in the news, targeting organizations and users of all types. In June, two hospital systems began notifying patients and employees of cyber incidents, one ransomware and one a data breach. The state of Texas is the latest state to ... Read More
AI – A Silver Bullet for Security It Is Not
Artificial Intelligence (AI) has yet to reach a level of thinking, reasoning, and decision-making like humans can do, only digitally. Nonetheless, its benevolence is appreciated in efforts to streamline customer support, improve online shopping, provide auto-advisory, and more. The application of AI is thought to be endless. It would seem ... Read More
Best Practices Companies Can Take to Stop Crypto-Miners from Hijacking Servers
Crypto-jacking is often considered the silent killer. Instead of stealing valuable IP, data, or funds, attackers are after CPU cycles. Attacks can persist for months or years, unrecognized, running in the background and consuming processing power. You may think it's not a danger or exclaim thoughts like: "that's not bad," ... Read More
7 Steps for Businesses to More Effectively Secure Data in the Cloud
Noam Rotem and Ran Locar, self-described security researchers and hacktivists, recently uncovered and exposed a 24 GB database that contained information pertaining to 80 million U.S. households – more than 62% of U.S. residences. The discovery brought to light weaknesses and data leaks in numerous files stored in the cloud, ... Read More

