The Next Normal: Strengthening Security After COVID
After a year-plus on our cyber-heels, what did we all learn? Here are 4 takeaways to strengthen security post-COVID… because the next ‘normal’ in IT Security is ours to define.
After a year-plus on our cyber-heels, what did we all learn? Here are 4 takeaways to strengthen security post-COVID… because the next ‘normal’ in IT Security is ours to define.
New perspectives, workarounds, and efficiencies developed throughout the pandemic are likely here to stay —and so are elevated and complex cyber threats. That’s where IT security ears need to perk up.
You’ve probably seen them used interchangeably, but distinctions between cybersecurity and IT security are important to understand to ensure accurate communication with stakeholders and vendors alike.
Sometimes the most dangerous enemies are the ones closest to home—and that’s exactly when cybersecurity needs to up its game.
Your organization may be equipped to deal with cybersecurity crises in-house, but recent data suggests that now more than ever, it’s more likely to end up in the courtroom.
Navigating a world made remote by COVID-19 has brought all sorts of new challenges to light—but amid struggles to adapt and socially distance, there are those determined to make the best of it.
However advanced cybercriminal tactics become, there will always be those who prefer to play it old-school—and sometimes the oldest, most reliable strategies are the ones you’re least prepared for.
In past articles, we’ve investigated in-depth the threat of the cybercriminal economy: stolen data sold and traded on the so-called “dark web,” along with increasingly malicious forms of software
This isn’t breaking news, but cybercriminals are after your data, and they’ll do just about anything to get it.
Oftentimes, cyber attackers are able to infiltrate the networks of organizations through holes in older programs which have not been updated. Recently, a malware known as “DoublePulsar” has been found targeting un-patched Windows systems, inserting itself within networks and laying seeds for future ransomware attacks. Here’s what’s currently known about this threat and what steps you can take to prevent yourself from falling victim to it. An Advanced Attacker As reported in Bank Info Security, a group of hackers known as the “Shadow Brokers” – believed to have ties with the Russian government – released a set of attack tools which exploit flaws in older versions of Windows. One of these tools, DoublePulsar, has been adopted by attackers and implanted in
We’re here to discuss your upcoming IT security assessment and compliance audit needs.