Blog
Are Password Managers Safe to Use?
Mon, 03/18/2024
Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.
These new cyber threats led to the creation of...
Blog
The 5 Most Common Supply Chain Attacks
Thu, 01/25/2024
Say, have you heard anything about supply chains lately? Of course, you have. This phrase has entered the zeitgeist with more gusto than Taylor Swift oozing rizz in a Chiefs jersey.
When we talk about the price of things, be they groceries or concert tickets, the conversation inevitably turns to someone remarking on “the supply chain,” and the rest of us nod knowingly.
Which is to say, supply...
Blog
Top 5 Data Security Incidents of 2023 and Predictions for 2024
Mon, 12/25/2023
As 2023 comes to an end, one thing is certain: cyber security is still a prime concern for most companies. While industries like healthcare and retail are still more heavily impacted than any other, a concerning trend has emerged in regard to the variety of organizations being targeted by cyber criminals.
This variety accounted for a staggering 20% increase in data breaches compared to 2022. More...
Blog
How to Develop Security Awareness Training
Mon, 10/09/2023
According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks.
This number shows how crucial it is to train your employees so they can recognize and report malicious emails.
That’s where cyber security awareness training comes in. With the right training program, you can provide your...
Blog
What Organizations Can Learn from the Toyota Cloud Breach
Mon, 09/25/2023
Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever.
According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries.
The auto industry has recently integrated cloud storage at all levels of their...
Blog
The Chain Reaction: Why Cyber Security in Supply Chain Networks is Critical
Fri, 09/15/2023
Imagine countless organizations working together like a well-oiled machine to create and deliver the products and services we rely on. That’s what supply chain networks are.
Like a machine, each connection is vital to make the whole thing work. It’s a delicate dance of supply and demand, where each organization plays its part in keeping the network alive and thriving.
And with technology...
Blog
Risky Business: When Third-Party Troubles Become Your Own
Tue, 09/05/2023
Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations.
Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations.
These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog
Why Transparency After a Data Breach is Important
Mon, 08/07/2023
It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come.
One of the biggest issues with data breaches, and what is often the most damaging outcome, is the loss of trust from customers. After all, if a breach happened once, how do you know it won’t...
Blog
How to Report a Phishing Email Scam: What You Need to Know
Fri, 07/21/2023
Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year.The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams.Their typical email inbox is overflowing with emails from colleagues, partners, friends, family, third-party...
Blog
Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?
Fri, 07/07/2023
Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization.
What is a Wi-Fi Pineapple?
A Wi-Fi...
Blog
How Scammers Are Using ChatGPT to Steal Credentials
Mon, 07/03/2023
Since its release, ChatGPT has been a hot topic, with more and more people growing to like it. Among the people who are enjoying the advantages of this AI tool are online scammers.
Hackers use ChatGPT's popularity to trick users into downloading malware and stealing their personal information, making it a hotbed for phishing scams.
Luckily, users can avoid falling prey to these scams and keep...
Blog
How to Enhance Third Party Risk Management with Cyber Security Training
Mon, 06/12/2023
Did you know that on average, every company is connected to ten third-party businesses?
There’s the payroll services company that remotely manages employee wages. The Software-as-a-Service (SaaS) cloud storage provider that backs up customer account data. The security company that provides access control to company buildings and systems.
To achieve an efficient supply chain, organizations rely...
Blog
Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It
Mon, 04/17/2023
The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible.
The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years.
Third-party vendor relationships are nothing...
Blog
What's the Damage? The Truth About the Cost of Data Breaches
Wed, 04/05/2023
In today's interconnected world, organizations are responsible for their cyber security practices as well as those of their third-party vendors. With increasingly complex risk management scenarios, the impact of a data breach can be catastrophic for an entire supply chain.
According to a study by IBM, 83% of U.S. companies who participated have experienced a data breach more than once, costing...
Blog
What You Need to Know About the Google Drive Scam
Mon, 02/20/2023
Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog
6 Things to Learn from the Garmin Security Breach
Fri, 02/03/2023
As much as we can say that cyber security measures are advancing, we can say the same about cyber criminals and their strategies.
In 2022, ransomware attacks occurred every 11 seconds on average, at a global annual cost to businesses and governments of $20 billion US.
Costs are rising in part due to the growing ransoms demanded from victims. While estimates of the average ransomware payout in...
Blog
Everything You Need to Know About Biometrics Hacking
Tue, 01/31/2023
Biometric authentication, such as face IDs, retina scans, and fingerprints, were introduced to our devices to increase security. At first, it felt like it was doing what it was meant to do. Plus, the convenience it brought with it was top-notch.
I mean, accessing your smartphone with your thumb? Logging into your bank account using your face ID? Amazing.
However, over the past few years,...
Blog
Cyber Attacks Pose the Biggest Risk to UK Banks – Bank of England
Thu, 01/12/2023
This financial sector’s reliance on computer systems and network has made it an attractive target for cyber attacks, now the biggest risk to the UK financial system.
In its latest Financial Stability Report, the Bank of England (BoE) agrees that cyber threats may be prevalent in 2023. The BoE said that it is working to strengthen defenses against cyber attacks.
The report identified three...
Blog
What You Need to Know About the 2022 Australian Cyber Attacks
Thu, 12/08/2022
There is a sharp rise in cyber attacks targeting businesses and organizations across Australia. The nature of these attacks ranges from ransomware and phishing scams to distributed denial-of-service (DDoS) attacks, with some estimates suggesting that the number of cyber incidents could be as high as one million per year.
The financial cost of these cyber attacks is immense, with businesses and...