Ë

Like a sniper, the most dangerous cybersecurity threats are the ones you never see coming.

Read More

A data breach remains a common headline in the news cycle. A different company, website or social network reports a security issue almost daily. If it feels like using the internet has become a risky endeavor, the feeling is accurate.

Read More

The number of publicly known data breaches decreased last year compared to 2017, despite harsher breach notification rules going into effect in Europe. The number of compromised sensitive records also went down by more than a third, from 7.9 billion records to around 5 billion.

Read More

The most effective method of social engineering was to send an email with a phishing link: 27 percent of recipients clicked the link, which led to a special website.

Read More

Beyond backup

By Security Features • May 2, 2017

Data protection threats can come in many forms, from both internal and external sources and range from disgruntled employees to hackers.

Read More

Enterprise IT and information security teams almost always find themselves pushing against resource limitations in the face of unending attacks

Read More

Within the specific context of Information Security, social engineering is any effort to manipulate or coax people into divulging confidential information.

Read More