<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

Data Breach: Weak Configuration - Financial Services Firms

Posted by Keith Shaffer Nov 6, 2018 11:04:00 AM

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak - especially when it comes to password protection. Weak configurations can be devastating to institutions holding large amounts of (sensitive) data such as financial services firms.

Read More

Topics: Cyber Security, Network Safety, Malicious Software, Data Breach

Data Breach Scenario: BYOD

Posted by Gabrielle D'Andrea Jun 29, 2018 10:32:30 AM

Companies around the globe have identified the convenience of employees bringing their own device to work. In fact, 82% of companies allow the use of personal devices for work, but out of those companies, which support BYOD, 50% were breached through an employee’s personal device.

Read More

Topics: Cyber Security, Network Safety, Internet of Things (IoT), Malicious Software, Data Breach

Data Breach: Weak Configuration

Posted by Gabrielle D'Andrea Jun 26, 2018 11:34:24 AM

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak - especially when it comes to password protection.

Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Malicious Software, Data Breach, Data Protection

Data Breach Scenario: Malicious Software

Posted by Gabrielle D'Andrea Jun 19, 2018 10:04:57 AM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article we will focus on the malicious software that makes organizations vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach