What is Social Engineering? Defining a Popular (Ethical) Hacking Strategy
What exactly is social engineering and how does it work? In this blog article, we talk about this very popular (ethical) hacking practice, describe how and why it works and provide a breakdown of a...
View ArticleCommon Social Engineering Examples & Attack Techniques
What are some of the most common social engineering examples and attack techniques that individuals and organizations need to know? In this blog article, we describe scenarios such as phishing,...
View Article10 Ways Businesses Can Prevent Social Engineering Attacks
How can today’s cyber-aware businesses prevent social engineering attacks? In this blog article, we look at some techniques and measures that an enterprise can use to protect their network and...
View ArticleThe NIST Privacy Framework: An Introduction
What is the NIST Privacy Framework and how does it relate to data privacy? Currently in draft stage, the framework was designed to help organizations determine the risk levels of data privacy within...
View ArticlePrivacy Violations Across Industries
In this blog article, we're talking about what a privacy violation is and give examples of privacy violations across industries. We're also providing guidance about how organizations can make sure that...
View ArticleCybersecurity 101 for Credit Unions: How to Strengthen Your Cybersecurity...
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal...
View ArticleHealthcare Data Privacy Overview: From HIPAA to HITECH
Healthcare is arguably one of the most data-driven business there is, which is why health data privacy is becoming a widely discussed topic. What is healthcare data and why does privacy matter? Which...
View ArticleDeepfakes and Cybercrime: An Introduction
How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology? Back in 2018, researchers found 14,698 deepfake videos...
View ArticleTips for Safe Black Friday Shopping
Many of us eagerly await the annual Black Friday offers to get a good deal on holiday presents (or gifts to self!). Unfortunately, Black Friday is also a great opportunity for cybercriminals looking to...
View Article5 Effective Tips to Prevent Ransomware Infection
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this...
View Article2019 Cybersecurity Roundup: The State of Data Privacy
How did the state of data privacy impact the global economy in 2019? It is highly likely that the year 2019 will be remembered as the era of data privacy. In this article, we talk about privacy trends...
View Article2019 Cybersecurity Roundup: The State of Cloud Security
As cloud computing embeds itself in our corporate culture, how has security impacted its use in 2019? In this blog article, we looked at how the state of cloud security enabled business in 2019 and...
View Article2019 Cybersecurity Roundup for 2019: The State of People and Cybercrime
The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social...
View ArticleWhy Do A Cloud Security Assessment?
As cyber-attacks targeting cloud infrastructures continue, using a cloud security assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become...
View Article5 Key Reasons to do a Cybersecurity Posture Assessment
A Cybersecurity Posture Assessment gives your company the intelligence to know where you stand with respect to cybersecurity risk. The modern business faces cybersecurity challenges as never before....
View ArticleWhy Data Privacy Is Critical for Your Business? Part I
Data privacy has evolved from “nice to have” to a business imperative and critical issue. More and more people are asking questions us about how their personal data is used. Privacy is fast becoming...
View ArticleWhy Data Privacy Has Become Critical For Your Business – Part II
Data privacy is critical for your organization as consumer pressure and regulatory fines is helping turn the tide on privacy attitudes by many enterprises including the tech giants. In our previous...
View ArticleA guide to Response Planning for COVID-19
Response plans provide to organizations the appropriate mechanisms for minimizing risk, loss and damage resulting from incidents such as COVID-19. As you are now aware, COVID-19, aka the Coronavirus,...
View ArticleHigh-Level Guidelines on Information Security when Working from Home
What guidelines should your organization be concerned with regarding information security when working from home? The world has entered “uncharted territory”. This was a statement from the World Health...
View ArticleCOVID-19: Could Going Passwordless Make Us More Secure?
Cyberattacks have increased in frequency during COVID-19 and now more than ever is the time to consider going passwordless to be more secure. The password is a simple thing that is employed throughout...
View Article