Posts Tagged ‘Blog’
Penetration Testing Basics: Why Your Business Needs It
What is Penetration Testing, and Why Does My Business Need It? Penetration testing, or pen testing, is a simulated cyberattack designed to identify security weaknesses in an organization’s systems, applications, and networks. It’s a proactive way to for your business to uncover and fix vulnerabilities before cybercriminals can take advantage, reducing the chances of data…
Read MoreHow Your Business Can Identify and Avoid Phishing Attempts
AI has propelled the digital world forward by optimizing workflows and increasing productivity, but access to new technologies has also improved the work of cybercriminals. In a recent ICS2 webinar, they found that AI was being utilized to make more convincing phishing scams by addressing common issues like grammar and spelling mistakes. Even though the…
Read MoreAddressing the Cybersecurity Skills Gap
The cybersecurity skills gap remains a constant issue year after year. Check out how our CEO Kris Rides and Sandy Silk Director of IT Security Education & Consulting at Harvard University tackle the challenge in an ISACA exclusive. Click here to learn more.
Read MoreThe Significance of October
Coming up half-way through the month of October, there is a sense of growing anticipation with the holiday season almost upon us. While it is easy to neglect October as simply the bridge month for our turkey dinners or creamy eggnogs, it has more significance than most would think. And no, I am not…
Read MoreCybersecurity in the New Administration
2016 has been a year, to say the least. With the loss of legends like David Bowie, Prince, Alan Rickman and Mohammad Alli, and of course a tumultuous presidential election leaving much of the nation divided, we’re just about ready to put this year to bed. However, we still have the better half of December…
Read MoreFacebook Fraud – False Likes, False Followers
Increasing issues surrounding false likes and followers made by accounts set up just for this purpose.
Read MoreSpear Phishing an old tactic using new distribution?
Phishing using data URI’s embedded in websites distributed using URL shortening services.
Read MoreFuture Wars Fought in Cyber Space?
USA General admits to cyber attacks in the middle east, we look at the history of cyber warfare.
Read MoreHackers Release Peoples Credit Histories
A statement released by Team GhostShell a group affiliated to Hacktivists Anonymous , claimed they have hacked into over 100 websites over the weekend. They gained access to passwords, documents and some data that even included credit histories. The hackers claim over 1 Million records have been leaked on the web. Analysis of the attack…
Read More