Blog

Blog

The Limitations of Zero Trust Architecture and How to Overcome Them

With cyber security incidents so prevalent, another result from the EY survey is impossible to ignore. A recent Ernst & Young (EY) report revealed that in the past 12 months, 81% of organizations experienced an average of 25 cybersecurity incidents. Furthermore, 53% of the surveyed cyber leaders concur that in today’s digital environment, a secure perimeter is non-existent. Given this stark...
Blog

Deepfakes: What They Are and How to Spot Them

Artificial Intelligence (AI) tools are getting more capable and creative every day. Generative AI is writing human-like prose and creating lifelike photography. 3D animation software is making those images come alive. Voice generation tools are replicating people’s voices with just a smattering of input. And it’s not coming out of Hollywood studios. Much of the excitement is due to the fact that...
Blog

The Crucial Need for Cyber Security in Nonprofits

In an increasingly digital world, the safety of sensitive information is paramount. Unfortunately, nonprofits have become a goldmine for cyber criminals seeking to exploit their often limited security measures. These organizations, while operating with smaller teams and budgets, are responsible for substantial funds and sensitive data, drawing the attention of online predators looking for an easy...
Blog

Top 7 K-12 Cyber Security Threats and How to Mitigate Them

Education and technology used to operate on separate tracks, but they have become increasingly interconnected in recent years. Adding software and connected devices to the classroom has given teachers more flexibility in their teaching styles and makes their job easier. However, these new tools came with essential responsibilities that took a moment to get embraced by teachers and school...
Blog

AI in Cyber Security: Pros and Cons, and What it Means for Your Business

AI has been making waves in virtually every industry, and cyber security is no exception. Several companies are adopting the technology into different business functions, such as logistics and IT. But as AI quickly leaks into the business landscape, it’s also been the subject of criticism. Recently, news reports have revealed that ¾ of global businesses are considering or have already implemented...
Blog

How to Develop Security Awareness Training

According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks. This number shows how crucial it is to train your employees so they can recognize and report malicious emails. That’s where cyber security awareness training comes in. With the right training program, you can provide your employees...
Blog

8 Examples of Vishing and How to Beat Them

Less of a cyber security threat and closer to a scam, Vishing refers to attempts to steal information or money over the phone by convincing the victim. These calls often use personal data acquired through previous cyber attacks to gain their victim’s trust. This type of threat is definitely on the rise—especially with the help of AI . Like many other hacks and scams, Vishing is a popular attack...
Blog

How Artificial Intelligence Benefits Cyber Security Awareness Training

AI is changing how people live and work. Thanks to intuitive machine learning systems, the ability to predict, personalize, and customize has reached new levels. These capabilities of prediction, personalization, and customization make AI the perfect match for cyber security awareness training . AI cyber security training lets you meet individual employee learning needs directly. Some employees...
Blog

What Organizations Can Learn from the Toyota Cloud Breach

Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever. According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries. The auto industry has recently integrated cloud storage at all levels of their...
Blog

What to Expect From Gone Phishing Tournament 2023

Every year, phishing statistics seem to get worse. The year 2022 witnessed over 4.7 million attacks, with a significant surge occurring in Q4, accounting for 1.35 million of those incidents. This trend indicates a steady annual growth rate of 150% since 2019. There is no doubt that phishing is the leading and most dangerous modern cyber attack. Recognizing these challenges, Fortra’s Terranova...
Blog

Why Cyber Security Awareness is Important in K-12 and Higher Education

K-12 and higher ed institutions were caught off-guard by the sudden shift to online classes—most found themselves vulnerable and unprepared for cyber threats. A recent slew of cyber attacks directed at school districts has led the US government to pass a new law called the K-12 Cybersecurity Act . This new legislation mandates the Department of Homeland Security’s Cybersecurity and Infrastructure...
Blog

The Chain Reaction: Why Cyber Security in Supply Chain Networks is Critical

Imagine countless organizations working together like a well-oiled machine to create and deliver the products and services we rely on. That’s what supply chain networks are. Like a machine, each connection is vital to make the whole thing work. It’s a delicate dance of supply and demand, where each organization plays its part in keeping the network alive and thriving. And with technology...
Blog

Your Real-World Footprint Has a Digital Counterpart: Here’s What You Need to Know About Digital Footprints

Detectives look for footprints and fingerprints because they’re instant proof of where someone’s been, what they touched, and where they’re headed. The concept holds online, too. Your digital footprint is a map of where you (and your devices) have been, what you do online, how you behave, and where you’re probably headed next in the cyber sphere. In this article, we explain what digital footprints...
Blog

5 Reasons to Integrate Microlearning Into Your Security Awareness Training Program

Ten words: knowledge retention, behavior change, real-time, attention spans, rich media. As a security leader in your company, chances are you see how rapidly the cyber landscape is changing and how quickly cyber threats are evolving. Phishing, data breaches, malware , ransomware , and more threats are getting more sophisticated with every new technology. These risks are expected to double by 2025...
Blog

Risky Business: When Third-Party Troubles Become Your Own

Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations. Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations. These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog

ChatGPT and Its Recent Cyber Security Scares

Conversational AI has lately been the talk of the town for most knowledge workers worldwide. While this technology has existed for a few years, OpenAI’s ChatGPT released this year is leaps and bounds ahead of anything seen before. This trailblazing web app has been used for anything from writing wedding speeches to helping people do their jobs more efficiently. One thing is certain—a shocking...
Blog

Here's How Abandoned Domain Name Can Become a Cyber Threat

Do you have old pages on your website that you’ve forgotten about? Obsolete projects with old domain names? Old pages that are no longer active? If so, beware. Those subdomains you’ve forgotten about can be highly valuable to cyber attackers. Keeping your organization’s website up-to-date typically means updating content. But while you focus on the new, don’t neglect any old domains or unused...
Blog

Updated FCC Legislation Could Mean New Data Privacy Requirements for Telecoms

Telecommunications companies (telecoms) have been prime targets for cyber attackers. They operate critical infrastructure passage, and vast amounts of customer data pass through their networks. The United States Federal Communications Commission (FCC) is aiming to strengthen data security with new regulations around data breach reporting by communications carriers. The agency has long required...
Blog

Cyber Security Burnout: What it is and 5 Actionable Tips to Avoid it

Even though your cyber heroes only work from 9-5, cyber threats are lurking 24/7. Many dangers can materialize online, requiring constant monitoring and security operations professionals to keep up with and potentially mitigate the latest threats and vulnerabilities. And with the rapid increase in global cyber attacks, the stress for cyber security professionals is through the roof. Because of the...
Blog

Why Transparency After a Data Breach is Important

It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come. One of the biggest issues with data breaches, and what is often the most damaging outcome , is the loss of trust from customers. After all, if a breach happened once, how do you know it won’t...