Blog
130 Cyber Security Statistics: 2024 Trends and Data
Mon, 08/12/2024
Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
Blog
The 2023 Gone Phishing Tournament Results: Everything You Need to Know
Tue, 02/20/2024
The results of Fortra’s Gone Phishing Tournament are here, and they highlight the potential power and danger of phishing across the world.
This global test uncovered that 1 in 10 individuals are susceptible to these attacks, which would have led to 90,000 compromised passwords if the campaign had been an actual cyber attack.
This year’s tournament featured an updated email and landing page to...
Blog
Swipe Right on Cyber Security: Let’s Talk About Zodiac Signs
Mon, 02/12/2024
With Valentine’s Day upon us, our thoughts turn to love, compatibility, and cyber security.
As Cupid strings his bow this Valentine’s Day, let’s explore how the stars might be influencing your approach to online security. Are you a Leo who roars against cyber threats, or a Pisces swimming through the sea of digital privacy?
Remember, while the universe might hold many mysteries, your cyber...
Blog
The 7 Most Dangerous Healthcare Cyber Attacks
Fri, 02/02/2024
While industries like banking and software can be devastated by cyber attacks, no other field is impacted by hackers like healthcare.
As an example, it’s hard to forget attacks like the ransomware that brought all 400 locations of Universal Health Services to a standstill for months in the United States. Healthcare facilities often can’t operate if they don’t have access to crucial information...
Blog
Law 25: Everything You Need To Know to Ensure Compliance
Fri, 01/26/2024
Online privacy and data protection have become pressing issues in recent years that many governments have decided to legislate. The Legault CAQ government has been behind many digital-related innovations, so it’s not surprising to see legislation like this.
This law is a legislative update since existing laws inadequately address digital data. It should be noted that Law 25 has teeth and isn’t...
Blog
The 5 Most Common Supply Chain Attacks
Thu, 01/25/2024
Say, have you heard anything about supply chains lately? Of course, you have. This phrase has entered the zeitgeist with more gusto than Taylor Swift oozing rizz in a Chiefs jersey.
When we talk about the price of things, be they groceries or concert tickets, the conversation inevitably turns to someone remarking on “the supply chain,” and the rest of us nod knowingly.
Which is to say, supply...
Blog
The Evolution and Limitations of Multi-Factor Authentication
Mon, 01/22/2024
As careers, banking, and healthcare move online, the need for more secure authentication has become increasingly urgent. While passwords have been adopted as the most common form of authentication, they pose many problems in terms of cyber security.
In recent years, especially since the rise of remote work in 2019, the adoption of multi-factor authentication (MFA) has steadily risen to over 60%...
Blog
Protecting Retail Businesses from Cyber Attacks
Fri, 11/24/2023
Retail stores are one of the oldest ways humans exchange goods and services. As they evolve, one of the most significant shifts they have undergone is the dramatic increase in technology integration within their operations.
From tools to check stock to staffing management and cash registers, retail stores rely heavily on technology for almost every aspect of their business. Unfortunately, all...
Blog
How to Develop Security Awareness Training
Mon, 10/09/2023
According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks.
This number shows how crucial it is to train your employees so they can recognize and report malicious emails.
That’s where cyber security awareness training comes in. With the right training program, you can provide your...
Blog
The Chain Reaction: Why Cyber Security in Supply Chain Networks is Critical
Fri, 09/15/2023
Imagine countless organizations working together like a well-oiled machine to create and deliver the products and services we rely on. That’s what supply chain networks are.
Like a machine, each connection is vital to make the whole thing work. It’s a delicate dance of supply and demand, where each organization plays its part in keeping the network alive and thriving.
And with technology...
Blog
Risky Business: When Third-Party Troubles Become Your Own
Tue, 09/05/2023
Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations.
Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations.
These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog
Updated FCC Legislation Could Mean New Data Privacy Requirements for Telecoms
Mon, 08/14/2023
Telecommunications companies (telecoms) have been prime targets for cyber attackers. They operate critical infrastructure passage, and vast amounts of customer data pass through their networks.
The United States Federal Communications Commission (FCC) is aiming to strengthen data security with new regulations around data breach reporting by communications carriers.
The agency has long required...
Blog
How to Enhance Third Party Risk Management with Cyber Security Training
Mon, 06/12/2023
Did you know that on average, every company is connected to ten third-party businesses?
There’s the payroll services company that remotely manages employee wages. The Software-as-a-Service (SaaS) cloud storage provider that backs up customer account data. The security company that provides access control to company buildings and systems.
To achieve an efficient supply chain, organizations rely...
Blog
Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It
Mon, 04/17/2023
The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible.
The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years.
Third-party vendor relationships are nothing...
Blog
The California Privacy Rights Act (CPRA) and How it Affects Your Business
Thu, 03/23/2023
New regulations are already keeping IT professionals on their toes in 2023. One monumental change for California residents and businesses is the California Privacy Rights Act (CPRA).
The legislation came into force on January 1, 2023. Legislators drafted the new rules to empower consumers and close gaps in the California Consumer Privacy Act (CCPA).
The CPRA gives customers more control over...
Blog
Got Malware? The Risk of Buying This Smart ID Card Reader from Amazon
Wed, 01/18/2023
KrebsOnSecurity blog recently reported on a popular, low-cost Common Access Card (CAC) reader available on Amazon that came with drivers infected by malware.
A compromised smart ID card reader can bring severe consequences to both government and private organizations. It gives hackers an easy backdoor means of infiltrating networks and systems, which can leave sensitive information vulnerable...
Blog
How to Protect Your Sensitive Information from Word Document Malware
Tue, 12/27/2022
If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks.
These attacks are designed to deliver malware and ransomware to targeted systems.
Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to deliver Cobalt Strike...
Blog
Top Examples of Malware Attacks
Wed, 03/02/2022
Malware is perhaps the most widely known out of all IT security threats. Since 1986, malware has become a significant concern for enterprise users, with recent examples including the Colonial Pipeline attack, Kaseya ransomware attack, and the SolarWinds Dark Halo breach.
However, these attacks are just the tip of the iceberg, with many businesses falling victim to malware and ransomware attacks...