May 29, 2018 - Is SEO poisoning a thing of the past or are there still effective ways to fool Google's algorithms and rank high in the search results using black hat methods?
April 24, 2018 - Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary concern is not what your credentials are but how you enter them.
April 17, 2018 - If retailers think they already have much to worry about, they have another thing coming— cybersecurity—and it's no longer something they can keep on the back burner. This piece helps retailers ask the right cybersecurity questions to protect their businesses.
March 22, 2018 - How do DDoS attacks work? And how do we protect our organizations from the growing size and number of attacks?
March 7, 2018 - An incident response plan does not need to be overly complicated. However, having a solid and tested framework for the program is key in the ability of an organization to respond to and survive a security incident.
February 21, 2018 - With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here's part one of our guidelines.
February 15, 2018 - Study after study reveals that healthcare cybersecurity breaches are on the uptick. In this blog series, we'll look into the reasons why healthcare cybercrime is trending, understand the motivations of threat actors behind it, and discuss what the healthcare industry can do to care for itself and the people they swore to protect.
December 27, 2017 - How does IPv6 compare to IPv4, and what do we need to do make a safe transition?
November 7, 2017 - In the first installment of this two-part series, we saw several crimes consumers should make sure they are on top of to significantly lessen the chances of encountering them in the future. For this post, we're going to look into each digital crimes that keep small businesses and large enterprises up on their toes. No, we don't have Advanced Persistent Threats (APTs) in the list. Yet.
October 19, 2017 - A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We'll show you how.