Lessons From the GitHub Cybersecurity Breach
This Tech Tip outlines three steps security teams should take to protect information stored in Salesforce.
Cyber NewsThis Tech Tip outlines three steps security teams should take to protect information stored in Salesforce.
Cyber NewsAzure says cloud-native single sign-on with a passwordless option is most-requested new AVD feature in the product’s history.
Cyber NewsInitial reports suggest a basic security error allowed the attacker to access the company’s live customer database via an unauthenticated API.
Cyber NewsWhy cyber teams are now front and center for business enablement within organizations, and the significant challenges they face.
Cyber NewsPreviously observed using fake Coinbase jobs, the North Korea-sponsored APT has expanded into using Crypo.com gigs as cover to distribute malware.
Cyber NewsCustomer Scenario: Hybrid Workers When the pandemic first hit, one Boston-based company immediately sent its 1,000 employees’ home to work remotely. Over the next 18 months, the advantages were hard to ignore. Productivity remained high, worker morale was up, and the company still achieved strong business results. Today, that company has decided to adopt a […]
Cyber ThoughtsAs a small to mid-sized business you know it’s more important than ever before to protect yourself from a cyberthreat. One way to do that is to provide ongoing cybersecurity awareness training and education to your employees and adopt cybersecurity practices as part of your company culture. It’s no longer just your IT and security […]
Cyber ThoughtsAre you confused about disaster recovery terms like RTOs (Recovery Time Objectives) and RPOs (Recovery Point Objectives)? Not clear about failover and failback? Wondering about the advantages of continuous data protection over snapshots? You’ve come to the right place. We can work with you to plan the right DR solution for our business. One that […]
Cyber ThoughtsThe recent pandemic and shift to remote work/cloud environments has created a whole new playground for cybercriminals. And their tactics keep evolving as hackers become smarter by the day. It’s no longer about classic threats like weak passwords and phishing. Today’s cybersecurity threats are a lot more advanced, and a lot more sinister. 4 Top […]
Cyber Threat Trends