Tag: vulnerabilities

Cybercriminals sell research data on the dark web is represented by a man in a cartoon burlar outfir running away from another man with a stolen folder

Smart Cybercriminals Sell Research Data on the Dark Web

by Kevin Lancaster

Passwords aren't the only thing cybercriminals are stealing to sell - cybercriminals also sell research data on the Dark Web, especially in healthcare. See how to foil their plans.

Read More
a laptop computer featuring a warning symbol on the screen is ahown against a bright blue background to symbolize a ransomware attack

Ransomware is on the Rise – How to Bolster Your Defenses

by Kevin Lancaster

Ransomware was a 2019 staple, and it's bigger than ever in 2020. Our security training and awareness tips can help you defend against ransomware.

Read More
a lab flask filled with orange liquid has a burglar face in it on a blue background representing hackers trying to steal data from drugmaker Gilead

Hackers Go Phishing at Gilead With New Bait

by Kevin Lancaster

Pharmaceutical giant Gilead has been the target of several strong phishing attacks using new types of bait. It's a great lesson in why maintaining awareness of new vectors of potential threats is an important part of a continued defense against phishing.

Read More
numbers and colored bars evoke an information stream while a person watches from the shadows to represent malicious insiders stealing compny data to sell on the Dark Web

Is Your Staff Moonlighting on the Dark Web?

by Kevin Lancaster

Malicious insiders are a bigger security threat than anonymous hackers. Your staff could be selling you out by selling access to sensitive systems and more on the Dark Web. Here's how to stop it.

Read More
a woman sits at her desk working on a computer while someone observes her through binoculars

Is Your Biggest Threat Already Inside Your Building? Our Top Tips for Combating Insider Threats

by Kevin Lancaster

While the evil hacker causing all of the problems is a popular cybersecurity villain, it isn't the whole story. Insider threats are an even bigger problem, and facing them head on with smart solutions is the best cure.

Read More

3 Ways for Healthcare Orgs to Combat COVID-19 Cyberattacks

by Kevin Lancaster

New information from CISA and NCSC details how healthcare organizations are under attack by cybercriminals looking to profit from COVID-19 data. These tips can help stop them.

Read More
a red triangle warning icon with an exclamation point insise is superimposed over a blue login screen

GoDaddy Breach Highlights the Importance of Credential Security

by Kevin Lancaster

The newest breach at security-challenged GoDaddy is a reminder that credential security doesn't just affect your business - it impacts your partners and clients too. Strengthen your business relationships by showing that you take it seriously in a few simple but significant ways.

Read More

We Don’t Underestimate the Power of the Dark Side

by ID Agent

Happy Star Wars Day! We're ready to help you man your deflector shields to prevent intrusions. Here's how our Dark Web Jedi can keep your passwords and data out of that wretched hive of scum and villainy, because the Force is strong in our solutions.

Read More
the words"world password day" are superimposed over a black and white photo image of a keyboard

Don’t Make These 5 Password FAILS! (But Do Notch These 2 Password Wins)

by Kevin Lancaster

World Password Day is right around the corner. See the 5 worst ways to create a password and 2 fast, easy, affordable ways to boost password security for a remote workforce.

Read More
a woman's hand is seen using a password authentication app near her laptop on a blue background

CISA Warns of Office 365 Remote Cybersecurity Risks

by Kevin Lancaster

New CISA guidance reveals flaws in cybersecurity strategies that may be dangerous for remote Office 365 users. We've got advice fro how to mitigate those risks.

Read More