• All
  • Company
  • Industry
  • News
  • Partners
Why Cyber Security is the New Health and Safety
Why Cyber Security is the New Health and Safety

Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings. This blog was originally posted by our partner, Tripwire. Today, it controls the safety of equipment used on process plants, the time professional drivers may spend behind the wheel, and even how long someone can stare at a computer...

Read More
Phishing Testing: Building Your Human Firewall
Phishing Testing: Building Your Human Firewall

Phishing is becoming a major threat vector for organizations all around the world. Phishing is the exercise of sending illegitimate emails designed to elicit a response from the end user, whether that’s clicking on a link that infects them with malware or tricking the user into volunteering information that they normally would not provide like a password or some other information that is useful to the attacker. Frighteningly, all signs are pointing...

Read More
Malicious Apps
Malicious ‘Back to School’-Themed Apps Target Young Users Who Don’t Know Better

Bad actors are constantly looking for ways to target unsuspecting users with malware or other digital threats. To increase the likelihood of a successful infection, these nefarious individuals incorporate holidays, current events and significant dates into their attack campaigns. And they are doing so with malicious apps. It’s, therefore, no surprise that digital miscreants are capitalizing on the end of summer by pushing out malicious apps with a focus on “back...

Read More
Foundational Controls for Common Attacks

In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attacks and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from the research that I have to share for the purposes of this post. First, the top common attacks from the survey respondents: The second conclusion is that the majority of respondents said they...

Read More
Taming the Great Disruptor: How Managing Change Can Bolster Your Security
Taming the Great Disruptor: How Managing Change Can Bolster Your Security

Did you know China is having a hard time hiring hackers to meet the demand of vulnerable U.S. security systems? Okay, well… that might be a fictional story published by satirical newspaper The Onion. But it does highlight an important point: vulnerabilities abound in computer systems, so much so that IT professionals are having a difficult time keeping up with them all. There’s a variety of reasons for why there are so...

Read More

Notice: Trying to access array offset on value of type bool in /home/secure19/public_html/wp-content/themes/ayro/framework/modules/blog/blog-functions.php on line 181

Ransomware has been the dominant nuisance to cyber security in 2016 thus far, and doesn’t seem to show any signs of slowing down. In recent news, the main target of a ransomware attack has been hospitals and health care organizations that have been left paying ransoms to unlock their encrypted files. The Carbon Black Threat Research team exposed a new strain of ransomware, that they have called “PowerWare”, after a failed...

Read More