Kovter – Malware of the Month, October 2019

Kovter – Malware of the Month, October 2019

| | Cloud and Data Security
Kovter — a malware that has evolved from a trojan-based ransomware to a click fraud malware and then to a fileless one — is Spanning's Malware of the Month for October 2019 ...
A diagram depicting the three parts of multi-factor authentication.

Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and Beyond

Multi-factor Authentication (MFA) combines what the user knows (password), with what the user has (security token) and what the user is (biometric verification) to ensure user identity. Learn why this verification method ...
XML External Entity (XXE) Attacks — Web-based Application Security, Part 5

XML External Entity (XXE) Attacks — Web-based Application Security, Part 5

| | Cloud and Data Security
XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they ...
2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways

2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways

Since 2015, Unitrends, a leading all-in-one enterprise backup solution provider, has conducted their annual Cloud and Disaster Recovery Survey to gauge the state of data backup across a wide range of organizations ...
TrickBot – Malware of the Month, August 2019

TrickBot – Malware of the Month, August 2019

| | Cloud and Data Security
TrickBot, at its root, is a form of Trojan malware. Like its namesake, malware of this type cleverly disguises its true intent. What's even more dangerous is that TrickBot is constantly evolving ...
CIA triad security model

CIA Triad: Best Practices for Securing Your Org

| | Cloud and Data Security
The CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the three pillars of the framework and ...
A four-step diagram detailing how to form a backup strategy.

Forming a Backup Strategy: 4 Steps to Follow

A comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow ...
Stegware aka Steganography Malware – Malware of the Month, July 2019

Stegware aka Steganography Malware – Malware of the Month, July 2019

Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware's relatively easy implementation and difficulty to detect have ...
An image depicting an SQL injection needle.

SQL Injection Attacks (SQLi) — Web-based Application Security, Part 4

SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that program ...
6-Point Office 365 Post-Migration Checklist

6-Point Office 365 Post-Migration Checklist

Plan for your post-migration with the same enthusiasm as your Office 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist ...
Loading...