Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

January Product Rollup: Life Sciences, Mobile App Updates and More

‍ Hello, 2023! This month, we’re excited to bring you some improvements to workflows in the Egnyte for Life Sciences app, support for file and folder templates in the Egnyte Mobile App, Microsoft co-editing improvements for the Egnyte Desktop App, refinements to the Egnyte for Salesforce integration, and more.

Cyber Trends for 2023: The Bots are Still Coming, but Humans are Driving Them

If one topic has been on the minds of CISOs and CIOs alike over the last three years of Covid and post-Covid hybrid enterprise work environments, it’s ransomware. A distributed tech workforce — using distributed software services — proved to be no match for highly automated ransomware bots and malware executing encryption attacks. But this year, like the end of War of the Worlds, the attacking bots may suddenly fall silent.

What is a digital asset or crypto transaction policy, and why is it important?

When working with digital assets or crypto, it can be difficult to know how many organizations and teams have access to your private keys at all times. In order to protect your customers and investors, it’s critical to develop a transaction and user policy layer. From compromised internal actors to simple fat fingers errors, the crypto industry is no stranger to both mistakes and targeted attacks leading to major losses.

Designing a digital asset or crypto transaction policy

We recommend that all organizations working with crypto, web3 or digital assets implement transaction policies. This is a great way to prevent loss of assets without sacrificing speed and efficiency from an operational perspective. If you’re interested in learning what a crypto transaction policy is and why it’s important, check out the basics here. If you’re ready to start implementing transaction policies at your organization, you’ve come to the right place.

Kevin Mitnick Password Manager Hack Demo

Kevin Mitnick, KnowBe4's Chief Hacking Officer, reveal the real risks of weak passwords. Attack assumes the hacker is already on network with victim’s IP address and password, and is trying to access passwords on the victim’s locked password manager remotely. We strongly recommend that you use a password manager to reduce password reuse and improve complexity, but you may be wondering if it’s really worth the risk. Is it safe to store all of your passwords in one place? Can cybercriminals hack them? Are password managers a single point of failure?

What is Data Room Due Diligence and Why Should You Care?

You have to wonder about modern technology that makes life much easier for you and your employees when going through not only business processes but in everyday life as well. You can take a look at a virtual data room that has been created specifically for going through due diligence. This will be your starting point for your journey into modern technology.