Category

Security
The importance of establishing strong cybersecurity systems within small to mid-sized companies increases every day. 60% of small businesses who are the victim of a cyber attack close their doors within six months. The U.S. Small Business Administration claims over 1/3rd of all cyber crimes target small to medium sized businesses. Those statistics have continued...
Read More
What is a VPN? Every time you access a website while browsing the internet your data must first go through your Internet Service Provider (ISP). They can log and track that data while seeing everything you do online. Some of these companies even sell that information to governments, advertisers, or other third parties.  A Virtual...
Read More
🎁 Tips for Safe Online Holiday shopping. 🛍 In 2018, 8% of consumers surveyed said they were victims of Identity theft during the holiday season. As black Friday approaches 56% of holiday shoppers plan to make purchases online in 2019. Before you shop this holiday season, we have prepared a list of cyber tips for...
Read More
A phishing attack using a novel technique to steal credentials from American Express customers was recently found in an email inbox protected using Microsoft’s Office 365 Advanced Threat Protection (ATP) by Cofense Phishing Defense Center researchers. The phishing campaign targeted both corporate and consumer cardholders with phishing emails full of grammatical errors but with a small but...
Read More
Written by: Teju Shyamsundar of Okta In today’s tech landscape, the importance of securing user logins has become a no-brainer. We’re constantly seeing reports of data breaches as a result of identity attacks, and we know those threat actors aren’t going anywhere. According to the 2018 Verizon Data Breach Investigation Report, stolen credentials are still the...
Read More
Written by: Michael Busselen of Crowdstrike The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,”includes the combined work of CrowdStrike’s skilled and seasoned teams that engage in global intelligence gathering and analyzing, proactive threat hunting, and incident response investigations. The threat report also reveals the trends that these teams have seen in 2018 — trends...
Read More
Written by: Damien Lewke of Crowdstrike The holidays are a time for reflection, getting together with friends, shopping — and increasingly, cybercrime. With the rise of e-commerce, adversaries gleefully look forward to the holidays as an opportunity to harvest valuable payment and credential information from record numbers of unsuspecting online shoppers. In the United States...
Read More
Our world is mobile. You work in the office and everywhere else, using our mobile devices. What happens beyond your office’s firewall?  Are you secure inside your work environment? What about in the wild? Without endpoint security on your devices, you are vulnerable. What is endpoint security? Endpoint security is essential to the protection of...
Read More
Written By Scott Taschler of Crowdstrike Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal, it seems “graph” could be poised to take center stage as a security industry buzzword and the next must-have cybersecurity technology. However, using a hot technology doesn’t...
Read More
There are roughly 156 million phishing emails sent each day. 16 million of those emails make it to inboxes and are not sent to spam. Out of those numbers, 80,000 people take the lure per day from phishing emails. A phishing email attack is when a hacker baits an organization by posing to be someone...
Read More
1 2 3 6