7 Ways Hackers Target Your Employees

Cybercriminals are testing the strength of your organization’s defensive wall, looking for the one crack they need to launch their attacks. Oftentimes that flaw isn’t a “what,” but a “who.” Read/see the slide show explaining the seven ways in which hackers target your employees on Dark Reading.

Mature Access Management Curtails Breaches

Enterprise security is failing, and one culprit is immature identity and access management (IAM), according to a new study, “Stop the Breach: Reduce the Likelihood of an Attack Through an IAM Maturity Model,” which was conducted for Centrify by Forrester Consulting. In 2016, the report states, hackers compromised more than 1 billion identities. Read/see the […]

11 Cyber-Security Predictions for 2017

A new forecast predicts that automated malware attacks will have a devastating effect on the internet of things (IoT). It also predicts the rise of the Shadownet (IoT botnets that can’t be seen or measured using conventional tools), cloud poisoning, more growth of Ransomware as a Service, and attacks on smart buildings Read/see the slide […]

How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Read/see the slideshow explaining […]

How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Read/see the sideshow explaining […]

The 6 Riskiest Social Media Habits to Avoid at Work

Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk. Read/see the slideshow explaining the six riskiest social media habits that employees should avoid at work on Dark Reading.

Dealing With Email Security Threats

Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches. However, despite perceptions that these attacks mostly originate from the outside, many breaches are connected to internal glitches, breakdowns and problems, according to a February 2017 report from email security vendor Mimecast […]

7 tips to strengthen online security

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily […]

Cisco Cyber-Security Report Finds Server Threats Increased in 2016

Security breaches aren’t just a nuisance. They can also have real financial impact on the organizations that are exploited. That’s one of the many high-level findings from the Cisco 2017 Annual Cybersecurity Report (ACR). The massive 110-page report provides insights from Cisco’s own research efforts as well as a survey that received responses from 3,000 […]

Companies Are Ill-Prepared for Cyber-Attacks

A recent survey reveals that most organizations are not prepared for outsider attacks, data vulnerability, insider sabotage, user errors and phishing. It also explores security concerns when migrating to the cloud and reports that IT-decision-makers fear for their jobs. Read/see the slide show explaining how companies are still ill-prepared for dealing with cyber attacks on […]