FTC: Ring failed to stop hackers from accessing users' cameras Security Staff June 1, 2023 Under the proposed FTC order, Ring is prohibited from profiting from unlawfully accessing consumers videos and must pay $5.8 million in consumer refunds.Read More
How organizations can protect against phishing campaigns Tonia Dudley June 1, 2023 With cybersecurity threats on the rise, there are two crucial steps an organization can take to avoid falling victim to a credential phishing attack.Read More
How security teams should respond to sophisticated ransomware attacks Carlos Arnal Cardenal May 31, 2023 As a constantly evolving form of malware, ransomware attacks only grow in sophistication and find new ways to steal business-critical data. Read More
The growing multifactor authentication imperative Jay Martin May 30, 2023 Using standard "enter your username and password" login credentials for any cloud-based resources is a security nightmare for IT teams. Read More
Cybersecurity for small businesses Corey Nachreiner May 22, 2023 While many SMBs mistakenly presume they’re safe from cybercriminals, low IT funding makes them a target for threat actors and future cyberattacks.Read More
Report: Supplier cyber weaknesses impact big business Security Staff April 19, 2023 A recent report, State of Cyber Security in the Supply Chain 2023, spotlights the key security weaknesses in the supply chain ecosystem. Read More
Report: 58% of victim organizations don’t have MFA enabled Security Staff March 29, 2023 A new report reveals a turbulent year in the threat actor community as Russia’s invasion of Ukraine disrupted the operations of top ransomware groups.Read More
How small & medium-sized businesses can shore up cyber defenses Greg Tomchick March 28, 2023 With the shift to cloud services, the digital threats organizations face grow more ominous, leading to the question — is technology moving too quick?Read More
How attackers are pairing MFA manipulation & social engineering tricks Sinan Eren February 15, 2023 The right combination of training, security policies & zero trust technology can provide protection from any credential-based attack vector. Read More
Reducing RPA security risk Anthony Moillic February 14, 2023 Robot process automation (RPA) has expanded to meet workforce needs. Unfortunately, RPA can put the sensitive data that it touches at risk. Read More