Phishing attacks remain a threat to enterprise systems and data, and the method of entry is no longer limited to email. Your employees may not be trained to recognize some of the newer attempts to gain access to your technology. The typical phishing attempt is still carried out through a legitimate-looking email message. The telltale sign is the sense of urgency to take action so as to gain or avoid something. The specific format of phishing attacks continues to evolve, with some looking like … [Read more...]
Testing the Security of Your Communications Systems
Your communications systems provide critical access to customers and business partners, and you likely have an extensive security policy in place to ensure their protection. From encryption to next-generation firewalls, you have taken time to consider different types of attacks that could threaten your Voice over Internet Protocol (VoIP). From a response standpoint, you likely have a disaster recovery plan in place that includes steps for recovering backup data and continuing business … [Read more...]
Systemic Attacks Call for More Layers of Cyber Security
Cyber attacks are becoming systemic. Public cloud providers are in the crosshairs, as are Software as a Service providers. Attacks such as May 2017's WannaCry show the extent to which a ransomware cryptoworm can travel across continents, impacting a majority of the world. It’s just one example of why cyber security strategies must be fine-tuned to protect data, regardless of how small your organization might be. Cyber criminals are experts at finding weak points where they can launch an … [Read more...]
How Do You Do BYOD Right?
It’s difficult to imagine employees not bringing their own device to work in this mobile-friendly era. Some might even bring two or three. While these devices are for personal use, they’re also being implemented to tackle day-to-day tasks, which is why most employers have no problem with the bring your own device (BYOD) revolution. With the growth of BYOD across industries, it is critical for all businesses to establish a safety policy to protect important data. Securing the … [Read more...]
Why Small Business Cyber Security Is Vital
The headlines about data breaches usually focus on the bigger companies, like Target, Yahoo and Marriott, as well as health care institutions when they get hit. That might fuel the belief that cybercriminals only target the big guys, but it’s not true. Small business cyber security strategies must be in place to protect the little guys, as well.The United States Cyber Security Alliance conducted research recently and found that small business cyber security is important because it protects … [Read more...]
Identifying Threats to Cloud Infrastructure Security
While it’s always ideal to build security automation into the software development process, it’s never too late to engage in threat modeling to better understand cloud infrastructure security. The practice provides a way for organizations to better understand any potential vulnerabilities, as well as develop a strategy for managing threats. The following steps will help you create a threat model for cloud infrastructure security: Identify your team: The ideal combination includes … [Read more...]