Business email compromise (BEC) is a low-cost, effective cyber crime tactic that has increased within the past few years. BEC puts any company that manages financial transfers and payments at risk. Consider this, recent research shows that on average, more than 6,000 organizations were targeted by BEC emails each month from July 2018 to June […]
Zoom: The anatomy of vulnerability detection and response – Zoom’s recent vulnerabilities enabled potential attackers an easy way to gain access to users’ computers by remotely taking over their computer webcams and initiating video-enabled calls on devices without user consent.
The cyber security threats facing your business today are constantly changing, along with your network as new software, hardware, and user activity are introduced. All of these factors present an ideal scenario for a cyber attack. Understanding your threat surface – the set of all parts of your network where vulnerabilities and threats could lead to access by unauthorized users – is a critical step to improving your network security posture.
Are Your Mobile Users Protected? With the vast amount of corporate and personal data on smartphones and tablets today, mobile devices have quickly become attractive targets for cybercrime. As attacks increase year over year, how do you protect the security of mobile users on your network? Keeping mobile users safe and networks secure are critical […]