Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Getting Zoom Security Right - 8 Tips for Family and Friends

If you’ve read a newspaper or watched the news in the past few weeks, you’ll notice one common topic that all the major news outlets are discussing… COVID-19. Right now, many companies are trying to provide employee guidance during this worldwide pandemic, as governments ask those who can to work from home in an effort to slow the spread.

How were we Hacked? Part 1

When we read about hackers, we either think of people in Anonymous wearing Guy Fawkes masks or else that film from the mid-’90s were roller blade rolling teens bring down the baddies with elaborate rabbits and trojan horses. While complicated CIA type hacking may exist the VAST majority of hacking is simply someone getting your password and logging in online just like you would The VAST majority of hacking is simply someone getting your password and logging in online just you would

Tips for Managing Third-Party Risk in Health Care

The healthcare industry possesses the crown jewels that the bulk of attackers are after: Personally Identifiable Information (PII). Data has become the new currency in the digital underground, consisting primarily of social security numbers, credit card information, health information, and passwords.

5 defensive COVID-19 actions IT managers can take now

As if there wasn’t enough to worry about these days, cyber attacks have taken a sharp uptick since the COVID-19 pandemic began this year. From January to March, AT&T Alien Labs Open Threat Exchange (OTX) saw ​419,643 indicators of compromise (IOC) related to COVID-19, including a​ 2,000% month-over-month increase from February to March. Cybercriminals are taking advantage of the shift to remote working, increasing their volume of attacks by nearly 40% in the last month.

Securely execute a BYOD policy for your remote employees

From global pioneers to budding startups, almost every organization around the globe has adopted a mandatory work-from-home routine due to the COVID-19 outbreak. This shift has brought up numerous questions for decision-makers: How are we going to pull this off? Is work-from-home strategy feasible? Is our network security going to be compromised? Is BYOD the solution?

COVID-19 Scam Roundup - May 4, 2020

Malicious actors continue to abuse coronavirus 2019 (COVID-19) as a lure to profit off of innocent people. Indeed, Arkose Labs found that 26.5% of all transactions recorded in Q1 2020 were fraud and abuse attempts—a 20% increase over the previous quarter and the highest attack rate ever observed by the security firm’s researchers. It’s therefore unsurprising that we’ve seen the U.S.

Transitioning to an Open CDE For Construction File Sharing

A single repository for all construction content changes the way people work, and it can make a big difference in project profitability. Increasingly, a CDE is an essential tool for conforming to Building Information Modeling (BIM) practices and meeting compliance requirements. It’s important to recognize that a CDE is not just for giant construction companies. It delivers the same benefits to smaller contractors and subcontractors who often operate on much thinner profit margins.