Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 51 - 60 of 106

SOC Report Refresher: What Are the Different Types of SOC Reports?

The rise of cloud computing has played a key role with businesses that outsource certain functions to service organizations. Since such organizations are

It's time to talk about your CYBER audit policy

Imagine for a moment that your organization is hit with a malicious Trojan that your office’s Information Technology (IT) staff hasn’t noticed

Cyber Monday Growth Brings Evolving Risks for Retailers

The trees outside are turning vibrant shades of red, orange and yellow, which has retailers seeing green. As Black Friday and Cyber Monday quickly approach,

Ransomware

Ever since the mid-2000s, industries around the world constantly have one fear in the back of their mind in regards to information security: ransomware.

Register to receive our weekly newsletter with our most recent columns and insights.

Phishing, Don't Take the Bait!

We’ve all heard about phishing by now. It’s the attack vector of choice for many hackers – in which the weapon used is a simple email.

Don't Be Lulled Into a False Sense of Security

In my journey as a cybersecurity professional, I provide a wide variety of services to an even wider variety of clients. Within those services, there is

SECURITY NOTICE: MAJOR ONLINE BANKING PLATFORM VULNERABILITY - FISERV

Businesses that utilize Fiserv eBanking platforms should take note of an online banking information disclosure vulnerability that was made public. Fiserv

If Only Those Employees...

One of the most common sentiments that I come across as an information security professional is that employees are the ones making the organization less

Register to receive our weekly newsletter with our most recent columns and insights.

Optimizing your two-factor authentication security

Often when discussing cybersecurity threats like phishing and initial points of compromise with clients, we’ll hear something along the lines of,

The IT Security Superhero's Guide to Good Cyber Hygiene

“Move along folks, nothing to see here!” is what I imagine stressed-out IT security crusaders worldwide murmur every night in their sleep.

Register to receive our weekly newsletter with our most recent columns and insights.