Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How were we Hacked? Part 2

I wrote recently about how Office 365 accounts are most commonly breached - through leaked credentials. This covered the different ways that credentials can be breached through various factors, including many human misconceptions and failures can be mixed with other internal and external forces. This article is going to cover the anatomy of what happens after the hacker has gained access. There are many things a hacker may be seeking including information extraction or means of corporate espionage.

Increase Employee Productivity with User Activity Monitoring

High employee productivity is vital for your business’s success. Yet only 34% of US employees are engaged with their work (and 13% are actively disengaged) according to a 2018 poll by Gallup. But the productivity of even the most engaged employees tends to decrease over time. Workers require constant support to stay productive. This is especially important when dealing with remote employees, as they aren’t within their manager’s eyesight and have lots of domestic distractions.

Uncovering Bots in eCommerce Part 3: What Sets Scraper Bots Apart?

Web scraping uses bots to collect large amounts of data from websites. Quite simply to extract content and data from a website. Data that’s publicly available. The scraper bot can then duplicate entire website content elsewhere. Scraper bots, most of the time, are not always bad. Bots are constantly at work behind the scenes making our digital lives run smoothly. They are usually looking for information that you are freely giving to your website’s visitors.

Redscan ThreatDetect Highly Commended at SC Awards 2020

Chosen from a final shortlist of five companies, ThreatDetect was selected for service excellence and, in the words of the judges, for helping organisations ‘to reduce mean time to detect and respond to threats from months to minutes’. “We are delighted to have been recognised in the SC Awards for four consecutive years.” said Redscan’s Product Marketing Director, Simon Monahan.

5 Best Practices for Protecting Data While Working Remotely

As the Coronavirus disrupted the day-to-day lives of billions of people around the world over the last several months, businesses are in the middle of what Time Magazine describes as the “world’s largest work-from-home experiment.” Practically overnight, many companies were forced to adjust their operations by moving millions of workers out of their offices and into their homes.

What are the Elements of an Integrated Risk Management System?

Integrated risk management (IRM) is “a set of practices and processes supported by a risk-aware culture and enabling technologies that improve decision making and performance through an integrated view of how well an organization manages its unique set of risks,” according to research firm Gartner Inc.

Top Cybersecurity threats For seniors

There are around 39.5 million people in the U.S. aged over 65, and a high percentage of them, particularly women (nearly 40%) live alone. Living alone makes seniors more reliant on technology, which can be a savior (think Zoom, Skype and other communication-centered technology) as well as a threat (from phishing to fake antivirus software and bitcoin scams). Are seniors more vulnerable to cybersecurity threats, and if so, what can be done to reduce their risks?

Is it time to consider leaving Symantec Email Security.cloud (MessageLabs)?

With the ever-changing email security market, is now the time to consider leaving Symantec Email Security.cloud (MessageLabs)? Broadcom’s acquisition of Symantec has already caused a trend migration away from Symantec.cloud services according to Proofpoint partner Spambrella. This article explains why Spambrella is attracting Symantec Email Security clients and also explains why you should consider moving to an alternative solution.

116 Must-Know Data Breach Statistics for 2020

Data is rapidly becoming one of the most valuable assets in the modern world. The digital giants that monopolize data are arguably the most powerful companies in the world, prompting ongoing conversations about anti-trust legislation and digital privacy. Despite the overwhelming value controlled by these entities, as we'll see, even companies such as Facebook are vulnerable to the byproduct of the rapid move to digitization – the data breach epidemic.