Eight Rules for Effective Password Protection

In the current business landscape, the largest threat to an organization is a data breach. Data breaches end up costing businesses a significant amount of lost time and revenue and can lead ...

Password Spraying: How Common Passwords Threaten Your Organization

When hackers target your organization with a password spraying attack, hackers are betting that one (or more) of your employees is logging in with a commonly used password. Threat actors adopt this ...

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their ...

The Cyber Trove of the Healthcare Industry

The past twelve months have been a strange time of evolving demands on global healthcare services, as well staggering transformations in the digital sphere. In many hospitals, these two topics overlap, as ...

The Benefits of Specialization in Threat Intelligence Research

Keeping Perspective Broadly speaking, a threat is a potential negative action or event that impacts a network or system. In cybersecurity, the term refers to intentional events, like hacking. A threat actor ...

A Chronic Illness: Why Healthcare Industry Needs an Update

According to the 2020 HIMSS Cybersecurity Survey With the continually expanding concerns of cyber-attacks on the healthcare industry, organizations must invest in secure systems. Breaches happen to healthcare organizations of all sizes ...

Pride and Passwords: Top Hacking Methods & How to Prevent Them

| | all posts, Password Tips
Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This ...

Cybersecurity and What’s Not Working from Home

| | all posts
Though 2021 signals positivity, including vaccines for COVID-19, some changes in the workforce due to coronavirus are likely to stick around. Many things are possible from the relative comfort of our own ...

From Paper to Passwords: Digitizing the Voting Process

2020 has introduced many unique circumstances. It’s shown us that there’s not a lot that can’t be done online, from school to therapy. The usefulness of the digital age has never been ...

From NIST Guidelines to Real-World Solutions?

There is no evidence to suggest that data breaches will become less frequent or less serious in 2021. In fact, as more of the population now works from how the risks are ...