As a cybersecurity professional, chances are that having a keylogger installed on any of your company’s machines is one of your worst-case scenarios. Once a keylogger is installed, nothing is sacred. Passwords, proprietary information, and banking credentials are just a few ...
The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.
At Ascend Technologies we spend a lot of time breaking into our clients’ networks as part of our Penetration Testing services. A major component of our methodology involves social engineering.
We're addressing a question we get asked all the time: What does a hacker look like?
Surviving as a professional in the cybersecurity realm is no easy task, but the need for more of us is ever-increasing. Below are some tips and tools that you might find useful if cybersecurity has been entrusted to you.
The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015. In fact, The Business Journals’ latest SMB Insight study ...
If you are like most executives caught up in the constantly-evolving threat landscape, you’re likely overwhelmed with trying to effectively secure your data. We still encounter organizations starting their security from square one on a fairly regular basis, and we know it’s ...
Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to ...
People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And ...
Most people are never far away from a tablet, smartphone or both. In fact, according to a Bank of America survey, more people reach for their phone first thing in the morning than a toothbrush or cup of coffee.
It’s no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo! But while those breaches are top-of-mind and easy to remember, it’s important to also remember the ...
It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ...
The retail sector continues to struggle with ever-evolving cyber threats and cyber risk. A survey earlier this year by the global consulting firm BDO found that privacy concerns related to data breaches are considered a top risk by retailers, tying for the No. 1 spot with ...
As the BYOD trend becomes mainstream in healthcare, it is enabling the mobile workforce to be more efficient and productive. But the benefits of the BYOD phenomenon come with their own set of risks.
In 2016, Business Insider Intelligence predicted there will be 34 billion connected devices, up from 10 billion in 2015. This latest prediction nearly doubles Gartner’s 20 billion connected devices prediction, but it doesn’t come close to other projections. In any case, ...