What’s the Difference Between Active Directory and LDAP?

Active Directory plays such an important part in the makeup of most organizations’ IT infrastructure, that it automatically becomes the first target for attackers. If an attacker gets into one of your user accounts, any you don’t know that it’s happened, it’s only a matter of time before you are the victim of a disastrous data breach (especially is this user account has special privileges). … [Read more...]

CISOs: How to Get the Cybersecurity Budget You Need (and How to Spend it)

The frequency and severity of data breaches over the last few years, combined with security incidents threatening well-known brands, has brought cybersecurity to the forefront of many board meetings. Data is being generated at an unprecedented rate and the value of data is increasing, which means that the potential attack surface grows year on year. Many organizations have taken steps to address … [Read more...]

Financial Services Still Suffer the Most Cyber Attacks

Given the nature of the financial services industry, it understandable why it is a prime target for cybercriminals. After all, financial institutions deal with large amounts of money as well as sensitive data, which could be used for other fraudulent activities. Then there’s hacktivists and nation-state actors, who are politically motivated cybercriminals seeking to cause disruption, for … [Read more...]

What is Data Privacy and How to Improve it

Data is a company’s most valuable asset. Yet, we are still seeing many enterprise organizations failing to give their data the proper protection it requires. For companies, compliance auditors and customers alike, the privacy of data is a key concern. So, what exactly is data privacy and how can you ensure that the data you store remains private? What is Data Privacy? Data Privacy (sometimes … [Read more...]

Healthcare Reports Highest Number of Data Breaches According to New Study

According to a new study by Beazley Breach plc, the healthcare industry recorded the highest number (41%) of data breaches of any industry in 2018. Education accounted for 10% of security incidents, 20% were from the financial sector, 13% from professional services, with other sectors making up the remainder. As for the top causes, hacking, malware and unintended disclosure accounted for 31% of … [Read more...]

What is an Advanced Persistent Threat (APT) and How to Defend Against It

With so many cybersecurity threats for you to watch out for, it can be difficult to keep up with all the acronyms, methods and protection techniques. With that in mind, we have created this quick guide to a commonly referred to method of cybersecurity attack; Advanced Persistent Threats (APTs). What is an Advanced Persistent Threat (APT)? An Advanced Persistent Threat is a method of cybersecurity … [Read more...]

3 Ways Monitoring Exchange Online Improves Security

Regardless of where you host of your email, whether it’s by a 3rd party or internal, it is by far one of the most common entry points for external attacks into your systems and data. Because of its importance when it comes to data security, monitoring Exchange Online is critical if you are to ensure its security. More and more organizations are now choosing to host their emails in the … Read … [Read more...]

How Do Data Breaches Happen?

According to the 2018 Cost of a Data Breach Study, conducted by the Ponemon Institute, the average global cost of a data breach rose from $3.62 to $3.86 million annually, an increase of 6.4%. Data breaches are unquestionably problematic for businesses across the globe, with new strains of malware and other methods of fraudulently harvesting valuable data evolving at a pace that is faster than … [Read more...]

12 Tips for Protecting PHI

Protected Health Information (PHI) is any data that is handled by a health care service provider, whether a Covered Entity (CE) or Business Associate (BA), that relates to the physical or mental health of an individual in some way. Any US organization that handles PHI is required to comply with HIPAA (Health Insurance Portability and Accountability Act of 1996). Below are some tips to help … [Read more...]

Why Humans Are Still an Important Part of the Cybersecurity Strategy

The market for cybersecurity solutions has exploded over the last few years, with exciting new developments into artificial intelligence and machine learning leading the way. There really is no shortage of solutions grouped into “handy” abbreviations, designed to address all manner of both external and internal threats; including malware, ransomware, hackers, insider threats, privilege escalation … [Read more...]