Quantcast
Channel: Hitachi Systems Security | Managed Security Services Provider
Browsing all 30 articles
Browse latest View live

What is Social Engineering? Defining a Popular (Ethical) Hacking Strategy

What exactly is social engineering and how does it work? In this blog article, we talk about this very popular (ethical) hacking practice, describe how and why it works and provide a breakdown of a...

View Article


Common Social Engineering Examples & Attack Techniques

What are some of the most common social engineering examples and attack techniques that individuals and organizations need to know? In this blog article, we describe scenarios such as phishing,...

View Article

10 Ways Businesses Can Prevent Social Engineering Attacks

How can today’s cyber-aware businesses prevent social engineering attacks? In this blog article, we look at some techniques and measures that an enterprise can use to protect their network and...

View Article

The NIST Privacy Framework: An Introduction

What is the NIST Privacy Framework and how does it relate to data privacy? Currently in draft stage, the framework was designed to help organizations determine the risk levels of data privacy within...

View Article

Privacy Violations Across Industries

In this blog article, we're talking about what a privacy violation is and give examples of privacy violations across industries. We're also providing guidance about how organizations can make sure that...

View Article


Cybersecurity 101 for Credit Unions: How to Strengthen Your Cybersecurity...

How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal...

View Article

Healthcare Data Privacy Overview: From HIPAA to HITECH

Healthcare is arguably one of the most data-driven business there is, which is why health data privacy is becoming a widely discussed topic. What is healthcare data and why does privacy matter? Which...

View Article

Deepfakes and Cybercrime: An Introduction 

How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology?  Back in 2018, researchers found 14,698 deepfake videos...

View Article


Tips for Safe Black Friday Shopping

Many of us eagerly await the annual Black Friday offers to get a good deal on holiday presents (or gifts to self!). Unfortunately, Black Friday is also a great opportunity for cybercriminals looking to...

View Article


5 Effective Tips to Prevent Ransomware Infection

You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this...

View Article

2019 Cybersecurity Roundup: The State of Data Privacy

How did the state of data privacy impact the global economy in 2019? It is highly likely that the year 2019 will be remembered as the era of data privacy. In this article, we talk about privacy trends...

View Article

2019 Cybersecurity Roundup: The State of Cloud Security

As cloud computing embeds itself in our corporate culture, how has security impacted its use in 2019? In this blog article, we looked at how the state of cloud security enabled business in 2019 and...

View Article

2019 Cybersecurity Roundup for 2019: The State of People and Cybercrime

The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social...

View Article


Why Do A Cloud Security Assessment?

As cyber-attacks targeting cloud infrastructures continue, using a cloud security assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become...

View Article

5 Key Reasons to do a Cybersecurity Posture Assessment

A Cybersecurity Posture Assessment gives your company the intelligence to know where you stand with respect to cybersecurity risk. The modern business faces cybersecurity challenges as never before....

View Article


Why Data Privacy Is Critical for Your Business? Part I

Data privacy has evolved from “nice to have” to a business imperative and critical issue. More and more people are asking questions us about how their personal data is used.  Privacy is fast becoming...

View Article

Why Data Privacy Has Become Critical For Your Business – Part II

Data privacy is critical for your organization as consumer pressure and regulatory fines is helping turn the tide on privacy attitudes by many enterprises including the tech giants. In our previous...

View Article


A guide to Response Planning for COVID-19

Response plans provide to organizations the appropriate mechanisms for minimizing risk, loss and damage resulting from incidents such as COVID-19. As you are now aware, COVID-19, aka the Coronavirus,...

View Article

High-Level Guidelines on Information Security when Working from Home

What guidelines should your organization be concerned with regarding information security when working from home? The world has entered “uncharted territory”. This was a statement from the World Health...

View Article

COVID-19: Could Going Passwordless Make Us More Secure?

Cyberattacks have increased in frequency during COVID-19 and now more than ever is the time to consider going passwordless to be more secure. The password is a simple thing that is employed throughout...

View Article
Browsing all 30 articles
Browse latest View live