A lot of cybersecurity processes are reactive. Indicators of Compromise (IOCs), for instance, interpret clues that could lead an organization to uncover threatening activity that is already in progress or has already compromised a system. This and other types of security monitoring are important for a holistic cybersecurity plan, but threat hunting is a different approach. What is Cyber Threat Hunting? Cyber threat hunting is when IT professionals proactively look for weaknesses that could allo [...]
Cybersecurity is an important part of your business strategy; there’s no doubt about that. With so many terms surrounding the ins and outs of cybersecurity, it can be hard to keep track and stay well informed. Indicators of Compromise: What is an ICO Used for? Indicators are activities that lead IT professionals to believe a cybersecurity threat or breach could be on the way or in progress or compromised. More specifically, IOCs are breadcrumbs that can lead an organization to uncover threate [...]
Data breaches are continually rising in frequency and intensity. Small businesses have been increasing their investments in cyber security steadily over the last five years. From antivirus to threat detection software, you can invest any sum of money into your cyber security measures and be the better for it, but that's not where the biggest threats to your business are coming from. Cyber security platforms can't do all of the work for you. Although there has been a drop in insider threats [...]
You wouldn’t let an ex-employee walk out the front door with boxes of documents, would you? Of course, you wouldn’t. You probably wouldn’t even let a current employee walk out the door with boxes of documents, especially those containing sensitive information. They could be lost, stolen, or otherwise, end up in the wrong hands. It could put your entire company at risk, plain and simple. So, why do you let them walk out the front door with their unprotected mobile device? Think about how [...]
What is Security as a Service? Every time you turn around, it seems like there is a new "BLANK as-a-Service" provided. These services are generally a business model that allows for web-based outsourcing. Security as a Service, or SECaaS, refers to web-based security solutions delivered over the cloud. SECaaS allows for a company to have an outside company to handle and manage their cybersecurity. For many small businesses, platforms that offer "as-a-service" are an ideal way to ensure the [...]
If there is one thing we know about cyber security, it’s that it's ever-changing. As the good guys come up with new ways to secure our systems, the bad guys figure out ways around that. It’s gone on this way for many years now and we expect to see that continue. Adaptive security architecture is a different take on cyber security, using an intuitive, multi-layered approach. Cyber security, in the past, has not operated as a similar situation would in nature. If we look at the human [...]
What is SOX Compliance? SOX stands for the Sarbanes-Oxley Act drafted by congressmen Paul Sarbanes and Michael Oxley, and passed by congress in 2002. The idea behind this act was to protect shareholders and the general public from both accounting errors and fraudulent practices in companies through improving the accuracy of corporate disclosure - meaning, your data needs to be safeguarded. Bringing transparency in corporate governance and formalizing a system of checks and balances has prove [...]
Spear Phishing vs. Phishing Spear phishing and phishing are both forms of malicious electronic communication that involve tricking people into giving out personal, sensitive information. The primary difference is that general phishing attempts are sent to masses of people, whereas spear phishing attempts are personalized to an individual. Consider the following scenario... You receive an email from your bank. They’ve emailed you before, so you’re not suspicious. You open the email and read [...]
Who does GDPR apply to? The GDPR applies to all businesses that have: Personnel in business locations of any type (e.g., office, manufacturing plant or distribution center) in the European Union Employees, contractors, consumers, customers, patients or other people who are citizens of, located within or currently traveling through the European Union Processing that includes some type of monitoring of individuals within, or who are citizens of, the European Union Goods and/or servi [...]
If you’re like 71% of small business leaders, you may feel vulnerable to a cyber attack. According to a study done by Microsoft, the biggest concerns for small to mid-sized business leaders are phishing schemes, compromised passwords, ransomware, and sensitive information being leaked by an employee. With the way cyber criminals have been working, your concerns are well-placed. Both ransomware and phishing schemes have rapidly grown over the last three years. These attacks haven’t doubled or [...]