How To Remain Productive and Keep Your Organizational Data Secure at The Same Time

Author(s):

Ben Herzberg, Chief Scientist and VP of Marketing, Satori

Data Security

The onset of the COVID-19 pandemic has accelerated the shift towards remote work globally. As businesses, organizations, and individuals rapidly adapt to this new way of working, it has become increasingly important to recognize the evolving threat landscape. Cybercriminals are persistently developing new methods to profit from vulnerabilities of remote systems, leading to an increase … Read more

Addressing Cybersecurity Issues in Telehealth

Author(s):

Frankie Wallace, ,

Cybersecurity issues in Telehealth

The healthcare industry has been notoriously lackluster when it comes to cybersecurity for a long time now. The long story short is that doctors are more focused on caring for their physical patients than they are on worrying about their data. That is on top of the fact that major health issues like COVID-19 are … Read more

Best Identity and Access Management (IAM) Practices for DevSecOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Best IAM Practices

Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their way into a system through brute force attacks; in fact, the most commonly known strategy is phishing attacks that help … Read more

Why Data Protection Must Be a Part of Every Cybersecurity Strategy

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

Data Protection - Ahsan Siddigui

Widespread transition to remote/hybrid work creates vast opportunities for cyber attackers. With much more data being stored in the cloud and employees toiling away in less-secure home-office environments, ransomware attacks have skyrocketed. All told, ransomware struck 66% of midsize organizations in 2021, up from 37% the previous year according to the State of Ransomware 2022 … Read more

The Importance of Cybersecurity in Mental Health Services

Author(s):

Frankie Wallace, ,

Cybersecurity in Mental Health

The importance of cybersecurity in the modern world cannot be understated. Over the last two years, we’ve seen cybercrime take off as criminals attempt to leverage pandemic fears and insecurities to steal money from the average citizen. COVID-19 birthed a second pandemic of cybercrime, and those using virtual tools for mental health services are uniquely … Read more

Is the Cyber Kill Chain Model the Ultimate Solution to Rising Ransomware Attacks?

Author(s):

Waqas S, Cybersecurity Journalist, DontSpoof

Cyber Kill Chain Model

Ransomware attacks have long since been on a steady rise, wreaking havoc and destruction within the cybersecurity industry. Since the coronavirus pandemic in 2020, there has been a 148% rise in ransomware attacks.  The situation in 2021 was alarming as the number of attacks continued increasing. The year 2021 saw some of the worst ransomware … Read more

3 Mistakes to Avoid When Deploying DMARC in Your Organization

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Deploying DMARC

Currently, most organizations understand the importance of deploying Domain-Based Message Authentication Reporting and Conformance (DMARC) to stay safe from the rising email fraud cases. DMARC protects your business’ trusted domains from endless email spoofing and cybersecurity attacks. Deploying this email authentication protocol prevents spoofers and phishers from exploring vulnerabilities in your email domain, which helps … Read more

,

Sitting Ducks: Are You Leaving Your Business Open for Attack?

Author(s):

Waqas S, Cybersecurity Journalist, DontSpoof

Business Security - Sitting Ducls

There have been some hugely publicized attacks on big brands over the years – some high-profile cases include the World Health Organization (WHO), Marriott Hotels and, most recently, T-Mobile. There is an alarming increase in the number of daily cyber-attack attempts and business security is top of mind. The question is, why have businesses become … Read more

Unified Endpoint Management and Security: Breaking Down the Silos

Author(s):

Achuthan Ramesh, Senior Product Marketer, ManageEngine

Endpoint Management and Security

Consider the case of a smart home. Smart home systems offer life safety monitoring using carbon monoxide detectors, smoke detectors, and flood sensors along with home automation technology such as smart locks, smart thermostats, and smart bulbs. Now, imagine using a different tool for each of the above smart home capabilities—suddenly, smart homes don’t seem … Read more