Foundational Controls for Common Attack Types

In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attack types and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from ... »

A Song of Phishing and Passwords via Cylance

Phishing for Developers Hackers are targeting Chrome extension developers with phishing attacks to hijack control over their extensions in the Chrome Webstore. The phishing attacks are very well crafted to display a replica of the real Google login page and use new ... »

#SecurityTipTuesday: Two-Factor Authentication

Did you know, about 63% of confirmed data breaches involved weak, default or stolen passwords? — Source: Verizon 2016 Data Breach Investigations Report  Security Tip # 4: Enable Two-Factor Authentication In the wake of countless data breaches, and social media ... »

#SecurityTipTuesday: Be cautious about unsolicited emails

“Your DHL package has arrived!” Oh fantastic, my package arrived! Wait, did I order anything that’s being shipped by DHL? Let me just click the attachment to make sure this is legitimate… And just like that, you’ve been infected. Security Tip ... »

3 Reasons Why Employees Don’t Care About Security

According to Verizon’s 2017 Data Breach Investigations Report, which analyzes security incidents that happened last year, again reported that humans were the weak link that led to many of the security breaches. So yes, cyber criminals will generally start with ... »