Tag: Data Breach

4 Reasons Why Automated Phishing Defense with Graphus is a Must-Have

by Kevin Lancaster

Automation in cybersecurity gives big bang for the buck. Here are 4 reasons that automated phishing defense with Graphus is a smart choice.

Read More
The ransomware attack at a German hospital represented by a black background with a red heartbeat readout and a red hospital building.

The Week in Breach: Cybersecurity and Breach News 09/16/20 – 09/22/20

by Kevin Lancaster

Ransomware is responsible for a death in Germany, the BlackBaud fallout continues, and our new resource to school you on ransomware in 2020

Read More
breach news for this week represented by a burlar stealing a staples logo

The Week in Breach: Cybersecurity and Breach News 09/09/20 – 09/15/20

by Kevin Lancaster

This Week in Breach: Staples leaves a door unlocked, new data on remote workforce threats, and securing data against corporate spies.

Read More
social media is a data breach risk represented by a phone schowing social media icons

3 Ways That Social Media is a Data Breach Risk – and How to Fight Back

by Kevin Lancaster

Social media is a data breach risk- and a must-have for today's companies. Here are 3 threats posed by social media and how to mitigate them.

Read More
the week in breach written in white in a black, marbled background with the W done to look like the Warner Music logo.

The Week in Breach: Cybersecurity and Breach News 09/02/20 – 09/08/20

by Kevin Lancaster

Breach News This Week: Warner Music sings the blues after a skimming attack surfaces, go for a wild ride in a failed cybercrime attempt at Tesla and our analysis of phishing in 2020

Read More

The Week in Breach: Cybersecurity and Breach News 08/26/20 – 09/01/20

by Kevin Lancaster

Breach News This Week: Ransomware moves in at Brookfield Residential, Cybercriminals go back to school & mitigating danger from Dark Web data dumps.

Read More
stopmsocial engineering attacks represented by an employee being manipulated like a marionette

3 Tools to Stop Social Engineering Attacks In Their Tracks

by Kevin Lancaster

Social engineering attacks aren't as complex as they sound. These solutions can help stop social engineering attacks cold.

Read More
protect trade secrets from cybercriminals represebted by a fish hook on a computer keyboard

Protect Trade Secrets from Cybercriminals in 1 Easy Step

by Kevin Lancaster

Cybercriminals don't just want your company's financial information or client files - they want your proprietary information too. Take this one step to protect trade secrets from cybercriminals.

Read More
2020 ransomware statistics

10 2020 Ransomware Statistics That You Need to See

by Kevin Lancaster

Read these 2020 ransomware statistics before you update your cybersecurity plan - because it's a threat that isn't going away.

Read More
third party data breach represented by a burglar reaching through several computer screens to steal data.

How Dangerous is a Third Party Data Breach in 2020?

by Kevin Lancaster

Companies can control their own cybersecurity, but not a business partner's. How dangerous is a third party data breach?

Read More