Healthcare Spotlight: Big Challenges, Bigger Solutions

Since the onset of COVID-19, it’s been challenge after challenge for hospitals nationwide. While tending to the unique and weighty demands of the pandemic, healthcare is simultaneously under siege from malicious actors seeking to take advantage of overworked staff and stretched IT security protocols. As our readers know, healthcare is one of the most at-risk […]

2020 Goes Phishing: 10 Most Effective Scams This Year

Strange correspondence in your email inbox? Unsolicited phone call from corporate? Though you may not know it, you’re on the wrong end of a phishing scam—and it’s time for you to sink or swim. Phishing, or deception via electronic communication to obtain sensitive data, is a notoriously common practice among cybercriminals. Phishing scams may ask […]

Man OUT Of The Middle: Security in the IoT

From smartphones to smart fridges, the future is now, and it’s everywhere. Nowadays, most devices are more or less linked into the Internet of Things (IoT), a term first coined by technology specialist Kevin Ashton in 1999 and currently used to describe a system of interconnected computing devices that can exchange data without a human […]

Leadership: Covering Your Security Achilles Heel

From phishing email campaigns to filched administrator credentials, we’ve seen hackers assault systems from all sides. Experts recommend the best defense is a unified front against malicious actors, but what happens when the very place you expect IT security policies from—your leadership team—is actually your organization’s Achilles heel? Ideally, IT security practices run like a […]

The Concerning Risks Of Open Source Assessment Tools

It’s all around you, so you start to accept the risks. But just because open source software is everywhere doesn’t mean it’s the right choice for you and your organization. You’ve probably encountered it in your everyday life; with names like VLC Media Player, GIMP, and Audacity in the game, open source software (OSS) is […]

Hackers Vs. Hospitals: What You Need To Know

The novel coronavirus is giving cybercriminals a chance to restructure their attacks for vulnerable targets, and hospitals are at the top of the list. More specifically, they’re after patient data—and with an influx of new patients and healthcare organizations working at maximum capacity, the stakes are higher than ever. Across the nation, hospitals cope with […]

Confronting Cyber Threats To The Financial Sector

The financial sector faces a bigger cyber threat than ever before, and decisive policy may just be the solution. Amid the COVID-19 pandemic, hackers are taking advantage of the newly complex landscape of interaction in several crucial industries. The financial sector has proven one of the most ample targets: cybersecurity strategists at VMWare, a software […]

Email Scams And Social Engineering: The Puppet And The Master

Venturing into your inbox on a Monday morning can feel like the most mundane of tasks. It’s easy to read, respond to, and discard new emails when you have hundreds of them to sort through. But in the process, you may be letting malicious entities slip through the cracks—and the chain reaction that can result […]

Cracking Down On COVID Crime

As cyber threats continue to mount in response to the socioeconomic effects of COVID-19, the cybersecurity industry has made it a priority to unite and fight back. To combat hackers bent on taking advantage of society’s fragile state, a group of nearly 400 cybersecurity experts have come together from across the world. The volunteer organization, […]

Repeat Offenders: Lessons From The Energy Sector

Lightning may not strike the same place twice, but cyber attackers tend to go with what they know works—which makes it all the more dangerous when organizations leave proven vulnerabilities untouched. In the case of the U.S. Department of Energy, cybersecurity practices remain troublingly stagnant. The agency may have the resources to patch holes in […]