Not sure what’s fact and what’s fiction when it comes to data breaches? Check out the top five data breach myths we’ve heard of…and the reality behind them! Data Breach Myth 1: Only Major Companies get Targeted for Data Breaches Reality: Any company of any size can be the target of a cyber-attack. We often only see news reports about …
Collection #1 Data Breach – What You Need to Know
If you’ve not yet heard, there’s been yet another data breach. So, what’s new, right? Security breaches most often occur because of a lack of awareness around security and, to be honest, because most of us are fairly lazy when it comes to password security. The Collection #1 data breach is no ordinary breach, impacting some 772,904,991 email addresses and …
How To Avoid Being the Victim of a SMiShing Attack
SMiShing is not a new tactic. A form of phishing, SMiShing is an activity that involves someone attempting to trick you via text or SMS message. If the trick is successful, the individual will receive your critical personal information. Did you know that there are approximately 913,242,000 texts sent every hour of every single day around the globe? This translates …
Are You PhishProof?
Phishing is one of the most common forms of cybercrime, so if you’re online, you’ve likely been targeted by a phishing attack—and you might not even know it. So what is phishing exactly? It’s the act of collecting personal information—including bank account numbers, passwords, and usernames—through electronic means, such as deceptive email messages and phone calls. According to RSA’s report …
How to Identify a Phish and How to Protect Against Phishing
Holiday season means phishing season, and that’s not the good kind of fishing that you do while you’re relaxing out on the lake—it’s the cybersecurity nightmare kind of phishing and it poses big risks for businesses of all sizes. My guest on the Converge TechTalk show today is Mison Riggins from Inspired eLearning and we’re talking about cybersecurity and the …
Instagram Phishing: How to Prevent It and What to Do If It Happens to You
Phishing is the most popular way to hack Instagram accounts, because, according to the hackers themselves, it’s the easiest! Instagram Phishers simply create a fake login page that looks just like the one on the “real” Instagram. Hackers create this spoofed login page through fake apps promising to help manage Instagram users’ accounts and use free hosting and paid accounts …
5 Reasons DevOps and Security Need to Work Together
There is nothing like speeding up your business processes and development cycles is there? DevOps has revolutionized the way businesses meet the constantly evolving needs of their customers, without sacrificing productivity. Even as good as it sounds, it can still come at a price if DevOps and security are not working together. With the speed at which new iterations are …
The Cybersecurity Disconnect: Addressing the Problem in the C-Suite
How committed is your company to cybersecurity? Recent reports show the answer isn’t very straightforward. In many cases, the CEO and CIO have different ideas of what data security means, and why it matters. It’s time to get both tech and business leadership on the same page in making data security a top priority. Understanding the Divide In a recent …
How to Create an Effective Business Continuity and DR Plan
We rarely get a warning when disaster is about to strike, be it a natural disaster or a cyberattack. Your best chance at detecting, containing and responding to a disaster of any kind is through a tested and proven plan. An effective business continuity plan and DR Plan provides detailed instructions before, during and after disaster strikes—and can make or …
CyberSecurity—The Greatest Challenge CISOs Face Today
What a time to be alive! The rapid advances of technology and dawn of an era dominated by the Internet of Things (IoT) has changed pretty much everything about life as we know it. Which is why it’s no surprise that cybersecurity is perhaps the greatest challenge CISOs face today. But let’s back up. Why is the IoT such a …