cybersecurity threats
6 Ways to Overcome Obstacles & Gain Executive Buy-in for Cybersecurity
Getting and maintaining executive buy-in and support for your cybersecurity program is never one-and-done. It’s an ongoing process that’s ever evolving, much like today’s modern threat landscape ...

COVID-19 Uncertainties Fuel Ransomware Attacks & Phishing Schemes | Apptega
COVID-19 has slowed the economy down, but hackers are busy as usual—looking to take advantage of the pandemic to breach systems, steal data, and profit by holding both systems and data hostage ...

How Can Small Businesses Safeguard Against Cyberattacks?
Small businesses have many of the same security challenges as larger organizations, without access to the same technologies Cybersecurity has become one of the biggest problems facing millions of internet and online ...

Post-Brexit Cybersecurity – Implications on Risk and Uncertainty
Who knows what is going to happen with Brexit, or when the United Kingdom will officially leave the European Union, with a deal or not. (Although at the time I write these ...
All About the Hotspot Honeypots
The Hotspot Honeypot is an illegitimate Wi-Fi access point which can appear as an authorized and secure hotspot. Despite appearances, it is actually set up by black-hat attackers or malicious hackers to ...
The Top 5 Insider Threat Behaviors You Need to Monitor
Have you overlooked insider threats in your organization? It’s probably time to take a hard look at this area. Believe it or not, insider threats often pose a greater threat to the ...

Ask These Questions When Evaluating SIEM Solutions
Modern IT infrastructure generates a wealth of data. A large or mid-size enterprise can generate petabytes and, in some cases, even exabytes of log and metadata. Hackers know this and intentionally target ...