Data Security

12 Essential Tips for Keeping Your Email Safe

Hey, did you get that sketchy email? You know, the one from that malicious hacker trying to fool us into…

2 weeks ago

Phorpiex Botnet Named “Most Wanted Malware” in November 2020

The Phorpiex botnet earned the notorious designation of “most wanted malware” for the month of November 2020. In its Global…

2 weeks ago

Mercy Health Fired Employee Responsible for Insider Breach

Mercy Health revealed that it had fired an employee who was responsible for an insider breach involving its systems. On…

2 weeks ago

Why Infosec Compliance Governance Should Be a Top Priority for CISOs

This is a guest post authored by Dr.Kenneth Cooper, CTO and Co-founder of Datapoint Solutions Consulting. The job ... Read…

2 weeks ago

Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints

Verizon has published a 2020 Cyber Espionage Report that finds the bulk of these types of attacks are aimed at…

2 weeks ago

Bitglass, The FedRAMP-Authorized Platform for Total Cloud Security

As evidenced by its FedRAMP Authorization from the Federal Risk and Authorization Management Program, Bitglass’ Total Cloud Security Platform is…

2 weeks ago

BEC Scammers Struck Philadelphia Non-Profit Food Bank

Malicious actors used a Business Email Compromise (BEC) scam to prey upon a Philadelphia non-profit food bank. According to The…

2 weeks ago

Why VPNs on mobile devices are a crucial part of securing access to corporate data

Securing access to business resources has always been of high priority for admins and IT teams. In the wake of…

2 weeks ago

Thoughts from the NCSC 2020 Annual Review

The National Cyber Security Centre (NCSC) released its annual review of 2020.  If you are unfamiliar with the NCSC, part…

2 weeks ago