Blog

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Blog

Stolen Credit Union Data on Dark Web Hits High in Q4

In Q4, Dark Web activity targeting Credit Unions reached its highest count in five consecutive quarters, according to Fortra’s PhishLabs. Attacks on Credit Unions jumped significantly during the second half of 2022, with threat actors advertising stolen card data from these institutions almost as frequently as National/Regional Banks. Data tied to financial institutions is considered especially...
Blog

Phishing: With Zero-Day Email Attacks Rising, Are Some Companies Giving Up the Fight?

Amid a troubling rise in zero-day phishing attacks, recent research suggests that some companies may be making an ill-advised shift away from blocking advanced email threats to responding to them post-delivery. If true, the capitulation couldn't come at a worse time. Since January, cybercriminals taking advantage of the COVID-19 outbreak have been targeting businesses and individuals with an...
Blog

Paying the Piper: What We Learned From the British Airways Fine

Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward- and reverse-proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Blog

Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss

Sun Tzu once stated that: “The supreme art of war is to subdue the enemy without fighting” and two and a half thousand years later his rhetoric stands the test of time, as today we are seeing this ancient ideal applied in the most modern of battlegrounds: the fight against cyber-crime. To tackle both the malicious and accidental data loss threat, organizations need to have preventative technology...
Blog

Like, Share and Destroy: How to Protect Your Business From the Social Media Threat

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses see the importance of using social media to quickly build their brand and reputation, there has been little emphasis on the downside to this. How social media can destroy a company’s reputation in an instant.
Blog

Cyber Threats & Technology Tips That Your Business Can’t Ignore

As new threats are introduced into the cyberscape as well as evolved traditional threats, businesses need to be more prepared than ever for a data breach and have the latest tools in place to mitigate risks.
Blog

Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast!

Cloud storage services and file sharing apps such as Dropbox, Box, Microsoft OneDrive and Google Drive are so widely adopted by employees—knowingly or unknowingly by their IT departments—that most don’t think twice about using them to share corporate information.
Blog

Why are my Google Calendar Invites Blocked by DMARC?

Are you sending Google Calendar invites and not getting replies, or maybe your invitees tell you they tried to reply and it was blocked? Or maybe you are trying reply to Google Calendar invites and being blocked saying the mail is not accepted due to your domain's DMARC policy?This is an issue I have been seeing, so I did some digging and I have figured out what is going on. Before I get to the...
Blog

Information Management Responsibility?

The management of information is primarily the owner’s responsibility and secondly the responsibility of all other stakeholders that may have a vested interest in the information, or the data owner. In a world where individuals and businesses are becoming engulfed in new data every day; personal ownership needs to take a more pro-active role in its management.