Blog Archives

Your Employees’ Credentials are on the DarkWeb – Now What?

Your Employees’ User Names & Passwords are Floating Around on The DarkWeb…Now What???

You must protect your assets by avoiding the most common password mistakes to protect your employee information from finding its way to the DarkWeb.

For most of us, the use of internet-based services is a huge part of our everyday lives.

Read more ›

Posted in cyber risk, DarkWeb, Phishing, Vendor Compliance
Tags: , , , ,

Cyberlitica Finds Your Employee Credentials on the DarkWeb – Now What?

Cyberlitica Found Your Employees’ User Names & Passwords Floating Around on The DarkWeb…Now What???

You must protect your assets by avoiding the most common password mistakes to protect your employee information.

For most of us, the use of internet-based services is a huge part of our everyday lives.

Read more ›

Posted in cyber risk, DarkWeb, Phishing, Vendor Compliance
Tags: , , , ,

Spear-Phishing Attacks: Why They Are Successful and How to Stop Them

White Paper: Spear-Phishing Attacks

Some of the most notorious cyber crimes in recent history — such as the attacks on major banks, media companies and even security firms — started with just one person clicking on a spear-phishing email.

Spear phishing is on the rise because it works.

Read more ›

Posted in Cybersecurity, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , ,

Cybersecurity Attack Surface – Part 1

Redefining The Cybersecurity Attack Surface, Part 1

by | Jan 4, 2016 | CYBERGOVERNANCE Journal

When discussing an organization’s security posture, “attack surface” is the common term used to describe the aggregate vulnerabilities that the firm exhibits.

Read more ›

Posted in cybergovernance, Cybersecurity, Fraud, Governance, Hacks, ID Theft, Malware, Malware & Other Threats, Phishing, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Biometrics & Behavior Recognition – Cybersecurity Evolves

The Username and Password is No Longer Enough… Cybersecurity Evolves With the Growing Threats

ae8409d7-f637-4a5f-9c41-264e1e3d2688ae8409d7-f637-4a5f-9c41-264e1e3d2688

In the wake of devastating personal information leaks, like Target’s back in 2014 affecting more than 70 million customers and the more recent Ashley Madison data breach,

Read more ›

Posted in biometrics, Compliance, Content, Cybersecurity, Hacks, Insider Threats, Layered Defense, Malware, Phishing, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , ,

Ashley Madison and the Insider Threat

Was the Insider Threat the Key to the Ashley Madison Breach?

Based on an article by Steve Rosenbush – WSJ

Now that personal information stolen from affair-seeking users of AshleyMadison.com has been posted on the dark Web, it’s a good time to extract some lessons from the episode.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Encryption, Hacks, Incident Response, Insider Threats, Phishing, Risk Management
Tags: , , , , , ,

Multi-Factor Authentication is a Must

Why Your Business Needs Multi-Factor Authentication

July 23, 2015
Multi-factor Authentication helps keep your eggs out of a single basket.Multi-factor Authentication helps keep your eggs out of a single basket.

There’s a good reason why leading SMBs are using multi-factor authentication (also known as “two factor authentication”,

Read more ›

Posted in Compliance, Content, Cybersecurity, Layered Defense, Multi-Factor Authentication, Phishing, Privacy
Tags: , , , , , , ,

Is Continuous Monitoring Enough?

The Insider Threat and Continuous Monitoring – Just One Piece of the Puzzle

by: Theresa Wood  for TripWire

Continuous monitoring is poised to do for information security what cloud deployment did for global productivity. Continuous monitoring not only has a role to play in preventing large-scale data breaches but it can also help compliance-sensitive organizations save money by facilitating long-term compliance continuity and reducing annual audit overhead.

Read more ›

Posted in Content, Continuous Monitoring, Cybersecurity, Hacks, Incident Response, Insider Threats, Phishing, Risk Management
Tags: , , , , , , , , ,

How Secure Are Your Email Channels?

Do Your Email Channels Put Your Cybersecurity and Compliance at Risk?

by Suhail Nanji, Area Director, Southeast Region  SMLR Group, Inc.

One of the best-kept secrets about email security is that most organizations don’t know all of the “users” using their email domain.

Read more ›

Posted in Compliance, Cybersecurity, Incident Response, Insider Threats, Malware, Malware & Other Threats, Phishing, Privacy, Regulatory, Trojan
Tags: , , , , , , ,

Fighting Cybercrime

Cybercrime and Digital Forensic Investigation: A Winning Combination

by Suhali Nanji, Area Director Southeast Region, SMLR Group, Inc.

Cyber insurance is one way organizations can fight cybercrime. Behind the scenes, however, laws and sentencing are getting tighter in response to the rise in cyber-attacks, while experts are creating more precise ways to identify cyber criminals.

Read more ›

Posted in Cybersecurity, Financials, Forensic Social Media, Fraud, Hacks, Incident Response, Legal, Malware, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: