Toward A Hybrid Workforce: The Future of IT Security

When 2020 began, no one could have predicted the working world’s massive shift to remote environments. Now, from VPNs to ever-expanding endpoints, remote security culture has become an integral aspect of today’s IT security. But what does that mean for the future? COVID-19 has irrevocably changed how we approach the modern office model, stretching our […]

2020 Goes Phishing: 10 Most Effective Scams This Year

Strange correspondence in your email inbox? Unsolicited phone call from corporate? Though you may not know it, you’re on the wrong end of a phishing scam—and it’s time for you to sink or swim. Phishing, or deception via electronic communication to obtain sensitive data, is a notoriously common practice among cybercriminals. Phishing scams may ask […]

Endpoint Essentials

An ever-expanding digital network with increasing connectivity of devices worldwide means a far broader field of vulnerabilities. As the Internet of Things (IoT) criss-crosses our professional and personal lives and devices, risk rises exponentially for endpoint security. In any organization’s internal network, an endpoint is a device or system that can link to that network. […]

Email Scams And Social Engineering: The Puppet And The Master

Venturing into your inbox on a Monday morning can feel like the most mundane of tasks. It’s easy to read, respond to, and discard new emails when you have hundreds of them to sort through. But in the process, you may be letting malicious entities slip through the cracks—and the chain reaction that can result […]

Insider Theft Leads to the Data Breach of 1.5 Million Bank Clients

Atlanta bank SunTrust recently announced that 1.5 million users have potentially been exposed to a criminal third party. Unlike most data exposures we’ve been hearing about, the source of SunTrust’s breach was not caused by cybercriminals, but rather a theft by an employee who gained access to sensitive client information without security clearance. Sources say […]

Employers Beware: W-2 Scams Running Rampant

Employees count on their employers to keep their private information safe. This is especially true during one of the most information-sensitive times of the year: tax season. For attackers who rely on social engineering tactics, targeting organizations right now can be a potential goldmine. We’ve previously discussed how social engineering tries to trick members of your […]

Insights From Verizon’s Data Breach Investigations Report

In early spring, while many people are anticipating the return of warm weather and blue skies, the information security industry is looking forward to the release of Verizon’s annual Data Breach Investigations Report (DBIR). Published since 2008, DBIR is a data security reference guide, playbook and bible. Global in scope, the report analyzes thousands of […]

Key Takeaways from Interop

Security was on everyone’s mind at this year’s Interop Las Vegas conference, with workshops ranging from insider threats to social engineering, supply chains and managing targeted attacks. One key point that emerged from all of the discussion was that businesses and governments need to understand the motivations of cyber attackers. Dmitri Alperovitch led the INTEROP […]

Retail PoS Systems, Ancient Passwords – What You Need To Know Now

You’ve probably seen coverage of the big RSA reveal regarding the fact that point of sale devices from a specific vendor have used the same pre-set administrator password for the last quarter of a century. Security researchers Charles Henderson and David Byrne, at their RSA presentation, were the ones who shared this discovery. More troubling, […]

Key Takeaways from RSA 2015

RSA 2015 drew more than 28,000 security-minded people to its latest week-long conference in San Francisco. The key takeaways from the discussions, workshops, and keynotes were highlighted by the tech, business, and mainstream press. The Associated Press coverage pointed out that attending RSA is a particularly sobering experience for those not involved in the security […]