Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

A new report published by KnowBe4 delves into the top security challenges and issues that IT professionals and UK-based organizations face, including attack types, security initiatives and organizational limits ...

A GIF Image Could Have Let Hackers Hijack Microsoft Teams at Your Firm

A critical vulnerability has been patched in the Microsoft Teams work collaboration platform after security researchers discovered a way in which hackers could compromise accounts and steal data with something as seemingly ...

Insider Threats Jump 47 Percent, as Incident Costs Reach $11.45 Million, New Study Shows

Amid the turmoil and confusion surrounding the COVID-19 pandemic, companies were forced to hastily implement solutions that could allow employees to shift to telework overnight, creating extensive opportunities for bad actors and ...

Ensuring Security in the Coronavirus Remote Working Era

Working from home has become the new reality for organizations of all industries and sizes as the nation struggles to contain the coronavirus pandemic. As companies contemplate an indefinite period of remote ...

Employee Account Takeover in the Age of COVID-19

Account takeover for employees, customers, and users has become a real issue since the COVID-19 outbreak. Here is why that is and what organizations can do about it. Since its discovery in ...

Root Passwords: The Root of Password Problems

The average online user has over 90 accounts between personal and work accounts that require a password. That is a daunting number of unique passwords to memorize. In an effort to remember ...
One-Click NIST Password Standard Compliance

Introducing 1-Click NIST Password Standard Compliance & More

Introducing one-click NIST password standard compliance, user reporting which outlines users who are using compromised passwords, and root password detection to prevent users from using root passwords. Microsoft’s Active Directory is used ...

Top Email Security Threats of 2020 – How To Stop Them

As hackers’ methods become more sophisticated, the scale of email security breaches and the frequency at which they occur grow greater with each passing year. In 2019 alone, an estimated 2 billion ...

5 Cybersecurity Threats That Will Dominate 2020

At MixMode, we can’t help but imagine the flip side of all that potential. An increasingly connected cyber landscape means an increased number of potential targets for bad actors. New tech is ...
Graphic: Illustration of an employee insider threat

What Is an Insider Threat? Definition, Examples & Statistics to Consider

Here’s what to know about insider threats — what they are, why they occur, and the damage they cause — and how to protect your organization $8.76 million. That’s the... The post ...