What is Emotet Malware and How Do You Defend Against it?

Emotet is a form of banking malware that was first discovered in 2014. Like many other forms of malware, its main objective is to extract sensitive information from the victim’s computer. However, unlike other forms of malware, Emotet is able to evade most anti-virus products. Hewlett-Packard reported a 1200% increase in the number of attacks using the Emotet Trojan, supporting a surge in … [Read more...]

What Is Active Directory and How Does It Work?

Active Directory (AD) is a directory service that runs on Microsoft Windows Server. The main function of AD is to enable administrators to manage permissions and control access to network resources. In AD, data is stored as objects, which include users, groups, applications and devices, and these objects are categorized according to their name and attributes. Domain Services (AD DS) are a core … [Read more...]

Why Complexity is the Biggest Enemy of Data Security

One thing about us IT folk is that we have a tendency to over-complicate everything. However, when it comes to data security, there isn’t much we can do about it. IT environments are not only growing in size, but they are becoming increasingly more complex, distributed and dynamic. Most modern IT environments consists of a large number of different users, applications and devices; with data … [Read more...]

What is the Cyber Kill Chain? Examples and how it Works

The Cyber Kill Chain was developed by Lockheed Martin as a framework to help organizations understand the process of cyber attacks. If you understand every point in the chain of events of a cyber-attack you can focus your efforts on breaking that chain and mitigating the damages. Many organizations have taken their own approach to defining the correct Cyber Kill Chain, with varying degrees of … [Read more...]

How Much Will a Data Breach Cost You and Can You Reduce It?

According to recent Trends in Cybersecurity Breach Disclosures report, the average cost of a data breach for a publicly traded company is $116 million. However, it’s worth bearing in mind that this figure will be skewed by the largest cases. The report is based on 639 cyber-security breaches that took place since 2011, and includes some of the largest breaches we’ve seen to date, which … [Read more...]

Maintaining Data Security When Employees Are Fired or Furloughed

When times are tough, employers must tighten their belts, which often involve cutting staff, either indefinitely or for an unconfirmed period of time. Either way, the off-boarding process must be carefully reviewed before doing so. HR will need to work closely with the IT department to coordinate their departure and ensure that they are not putting valuable company data at risk. Depending on how … [Read more...]

How User Behavior Analytics (UBA) can Improve Cloud Security

The need for enterprises to manage and maintain their own IT infrastructure is slowly, but surely, fading. This is hardly surprising given that many cloud service providers offer unlimited bandwidth and storage space at affordable rates, which enterprises can utilize, as and when required. Cloud services provide reliable disaster recovery, which can help to minimize website downtime, as the data … [Read more...]

Preparing to be a CIO: How to Reduce Stress

A Chief Information Officer (CIO) is responsible for the design, implementation and management of our IT systems, and plays an invaluable role in keeping those systems secure. What’s more, there is serious shortage of IT security professionals, and so the last thing we want to do is lose a valuable member of staff or discourage people from pursuing a career as a CIO. However, the life of a … [Read more...]

The Complete Guide to Social Engineering Attacks

Security teams across the globe are grappling with a seemingly insurmountable problem, and that is, people make mistakes! We all have moments of weakness, and we all have the potential of being manipulated by malicious actors. And yes! Even those who are responsible for maintaining the security of our critical systems, will sometimes fall victim to a social engineering scam. With this in mind, … [Read more...]

10 Best Practices for Data Breach Prevention

Almost 15 billion data records have been lost or stolen since 2013 – an issue that affects North America disproportionately more than other parts of the world. Should a company fall victim to an effective data breach, it could result in a loss of reputation, and could incur heavy financial losses. According to the 2019 Cost of a Data Breach Report by the Ponemon Institute, the global average cost … [Read more...]