Our Blog

Upgrade Windows Server 2008 to Avoid Significant Risk

Although they are fast approaching end-of-life status, Windows Server 2008 and 2008 R2 continue to drive mission-critical functions in many organizations. The two versions of Microsoft’s workhorse server operating system facilitate a broad…

Is Your Stored Data Secure?

With more than 3,800 data breaches reported since the first of the year, 2019 is on track to become the worst year ever for breach activity. Shockingly, many of these cases involve the theft of unencrypted data in cloud and on-premises storage…
,

Why Hackers Target the IoT and What You Can Do About It

Microsoft recently announced that it caught Russian government hackers using Internet of Things (IoT) devices to breach networks, look for other vulnerable devices, and access privileged accounts and sensitive data. Hackers were able to penetrate…

Why User Training on Personally Identifiable Information Is a Must

Between 2017 and 2018, the amount of compromised personally identifiable information (PII) jumped 126 percent as more than 446 million records were exposed. While no security technology can prevent every breach, organizations can reduce risk…

State of Email Security, Part 2: Data Breach Costs and Keys to Prevention

In Part 1 of this summary of the Mimecast State of Email Security Report 2019, we discussed the data indicating that IT teams are struggling to keep up with email-based threats. Because the primary email attack methods – business email compromise…

State of Email Security, Part 1: IT Teams Struggling to Keep Up with New Threats

Email-based attacks, particularly business email compromise (BEC) and ransomware, are up. Confidence in security defenses is down. Internal threats and data leaks are more prevalent. Better protection, threat intelligence and awareness training…

Modern Cybercrime Groups Adopt Businesslike Organizational Structure

The stereotypical image of a cybercriminal is that of a brilliant but socially awkward individual, usually wearing a hoodie, operating out of a basement and surviving on energy drinks and Hot Pockets. The reality is far more … corporate. While…

Are Your Executives Taking Cybersecurity Too Lightly?

A quick search of data breaches in 2019 will reinforce the fact that cybersecurity is directly tied to a company’s brand reputation. Facebook, LabCorp and Marriott are just three well-known brands that have been forced to deal with the fallout…

New Mobile Phone Scams Steal SIMs and Drains Financial Accounts

According to a recent news report, a San Francisco man lost $1 million — 90 percent of his life savings — in a matter of minutes when a hacker took over the victim’s mobile phone. This is just one of thousands of SIM swap scam incidents,…

Cryptojacking Attacks Spike as Hackers Prioritize ROI

Although cryptocurrency is somewhat of a mystery to the general public, large sums of money are changing hands through cryptocurrency transactions. However, people can also profit by mining cryptocurrency, verifying and authorizing transactions,…