dcsimg

The Most Common Ways You Could Get Tricked into Compromising Company Data

While major breaches where millions of records are compromised tend to dominate the news, a much more dangerous and insidious threat goes largely unnoticed — that of the insider. An “accidental insider” is a well-meaning employee who is tricked by adversaries or competitors into revealing passwords or unintentionally installing malicious code onto organizational networks. Alternately, … [Read more...]

Cyberattacks on Businesses Increased 23 Percent as ‘New Mafia’ Hits the Digital Streets in 2017

Malwarebytes™, the leading advanced malware prevention and remediation solution, today unveiled a report on the new age of organized cybercrime. It describes how this ‘New Mafia’ is accelerating the volume of attacks, sophistication and malice, which have increased 23 percent in 2017 versus 2016. Read the report here Learn more about Malwarebytes here … [Read more...]

Nine ways to Prevent Ex-employees from Compromising IT security

No one needs to be reminded of the almost daily, high profile media reports of security breaches and their devastating effects. However, little is said about the underlying threat of ex-employees. Everyone likes to think that they are parting with their employees on amicable terms, but who can be sure? Read more here … [Read more...]

Should You Share Your Feelings During a Work Conflict?

When a disagreement gets heated with a colleague, it’s normal to feel all sorts of emotions: disappointment, anger, frustration. But should you express those emotions? Or try to keep them close to your chest? Will it help if you tell your colleague that they’ve made you mad? Should they know how upset you are? Read more here … [Read more...]

Why You Need to Audit Privileged Access in Active Directory

If you’re not tracking permissions and the access your privileged users have to servers and data, you could be in danger of being taken advantage of. A recent report, published in Data Breach Digest by Verizon Enterprise, suggests that nearly 22% of organizations in Administrative support, 23% in Healthcare and Social Assistance and 22% in Public Administration faced data breaches resulting … [Read more...]

Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

When poet Alexander Pope first said “to err is human,” he probably didn’t realize how prescient those words were in capturing the world of cybersecurity. Yes, the root cause of most security breaches can be traced to human actions, or lack thereof. However, the bigger mistake is to believe that cybersecurity can be attained simply by correcting bad behavior. Read more here … [Read more...]

The state of ransomware among SMBs

This report, conducted by Osterman Research and sponsored by Malwarebytes, presents the findings on ransomware and other critical security issues from more than 1,000 small and medium-sized organizations surveyed in June 2017. Here’s what we discovered. View the report here Learn more about Malwarebytes here … [Read more...]

Hackers Are Targeting Your Mobile Phone. Here Are 15 Ways to Slow Them Down

Mobile phones have become the new prey of choice for hackers and other nefarious individuals. Once compromised, our phones offer easy access to our personal and financial information, giving hackers the ability to sell that information on the dark web and to ransom our information. Read more here … [Read more...]

See how LepideAuditor helps finance organizations pass compliance and safeguard customer data

According to the Verizon 2017 payment security report, nearly half (44.6%) of companies failed to protect payment card data on an ongoing basis; leading to PCI compliance failure. Other significant compliance mandates that financial organizations have to satisfy include the Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999 and the Sarbanes-Oxley Act … [Read more...]

8 Tough Questions to Ask About Your Company’s Strategy

Companies often fail to address the tough questions about strategy and execution: Are we really clear, as a leadership team, about how we choose to create value in the marketplace? Can we articulate the few things the organization needs to do better than anyone else in order to deliver on that value proposition? Are we investing in those areas, and do they fit with most of the products and … [Read more...]