Business email compromise (BEC) attacks are on the upswing. Cyber crime caused $3.5 billion in losses in the U.S. in 2019, with BEC attacks accounting for nearly half of that, according to the FBI’s Internet Crime Report. New findings from email security firm Agari released this week revealed an emerging group of cyber criminals masquerading… Read More
We Don’t Need No Stinking Patches: Why Organizations Don’t Patch
As a cyber security vendor, we regularly advise our readers and clients to “patch early and patch often.” There are many reasons why organizations don’t patch systems and devices, though. First off, let’s just say that patching is a bit like working out. We all know we should exercise regularly. The reality though, is that… Read More
5 Signs of a Phishing Email During the COVID-19 Pandemic
A phishing email is typically the starting point for many cyber attacks. While spam filters, whitelists, and anti-virus programs do an adequate job of keeping these emails from passing through to end users’ inboxes, there are still plenty of emails that make it through. Now, with the COVID-19 pandemic, many organizations have shifted to a… Read More
How Network Segmentation Can Improve Security: Part Two
In part one of our blog on network segmentation and security, we talked about how network segmentation can improve security and help you protect critical assets. We also covered two segments of network segmentation design as part of layered security. In part two, we’ll discuss two additional segments and how to go about protecting them… Read More
How Network Segmentation Can Improve Security: Part One
What is network segmentation? In simple terms, it refers to using subnets to separate sections of a network. There are several use cases for network segmentation: improved performance, better security, compliance, or even continuous monitoring. Regardless of the reason, the goal is to create separate subnets, or segments, for known network traffic. In this blog,… Read More
The Cyber Security Talent Gap: Developing Staff to Manage Risk
*This blog was co-authored by Sean Falconi Not a day goes by that we don’t hear about some new large-scale data breach, ransomware attack, or zero-day exploit that affects tens of millions of people. As a result of the increasing number of attacks, and their growing complexity, the need for highly skilled cyber professionals is… Read More