Tag: stolen credentials

Cybercriminals sell research data on the dark web is represented by a man in a cartoon burlar outfir running away from another man with a stolen folder
May 19, 2020

Smart Cybercriminals Sell Research Data on the Dark Web

Passwords aren’t the only thing cybercriminals are stealing to sell – cybercriminals also sell research data on the Dark Web, especially in healthcare. See how to foil their plans.

Read More
a laptop computer featuring a warning symbol on the screen is ahown against a bright blue background to symbolize a ransomware attack
May 18, 2020

Ransomware is on the Rise – How to Bolster Your Defenses

Ransomware was a 2019 staple, and it’s bigger than ever in 2020. Our security training and awareness tips can help you defend against ransomware.

Read More
numbers and colored bars evoke an information stream while a person watches from the shadows to represent malicious insiders stealing compny data to sell on the Dark Web
May 14, 2020

Is Your Staff Freelancing on the Dark Web?

Malicious insiders are a bigger security threat than anonymous hackers. Your staff could be selling you out by selling access to sensitive systems and more on the Dark Web. Here’s how to stop it.

Read More
a woman sits at her desk working on a computer while someone observes her through binoculars
May 11, 2020

Is Your Biggest Threat Already Inside Your Building? Our Top Tips for Combating Insider Threats

While the evil hacker causing all of the problems is a popular cybersecurity villain, it isn’t the whole story. Insider threats are an even bigger problem, and facing them head on with smart solutions is the best cure.

Read More
May 08, 2020

3 Ways for Healthcare Orgs to Combat COVID-19 Cyberattacks

New information from CISA and NCSC details how healthcare organizations are under attack by cybercriminals looking to profit from COVID-19 data. These tips can help stop them.

Read More
a red triangle warning icon with an exclamation point insise is superimposed over a blue login screen
May 07, 2020

GoDaddy Breach Highlights the Importance of Credential Security

The newest breach at security-challenged GoDaddy is a reminder that credential security doesn’t just affect your business – it impacts your partners and clients too. Strengthen your business relationships by showing that you take it seriously in a few simple but significant ways.

Read More
February 25, 2020

Consumers Are Skeptical About Biometric Data Security: How Companies Can Respond

In 2014, Apple’s introduction of the iPhone 6 was more than just an exciting iteration of its flagship product – it was the launch of Touch ID. This blockbuster device ushered in a new era of widespread biometric data use for the layman. Fingerprints had replaced passcodes as device gatekeepers, charged with protecting the most important, sensitive information.

Read More
February 18, 2020

Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries have some form of privacy regulations on the books, and another 10% are drafting legislation.

Read More
February 10, 2020

The NY SHIELD Act is Almost Here: How to Stay Compliant

Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New York’s “Stop Hacks and Improve Electronic Data Security (SHIELD) Act.”

Read More
February 06, 2020

The Importance of Building Better Passwords

Good password hygiene is one of the easiest ways for businesses and consumers to protect their accounts from the millions of attacks threatening personal data every day.

Read More

Please fill in the form below to subscribe to our blog