Ready, Set, Respond! Planning an Effective Incident Response Strategy.
Dwight D. Eisenhower, the 34th U.S. president, once said, 'Plans are nothing; planning is everything.' In this post we’ll dive into the fundamentals of incident response planning, and take it a step further to show how planning for an incident goes beyond just documentation.
Better Late Than Never: Addressing NIST’s Updated Password Security Guidance
NIST recently updated its decades-old password security guidance after years of scrutiny, skepticism, and flat-out ineffectiveness finally forced the agency to address practical security considerations and realistic threats while abandoning what many considered to be ineffective security theater.
Navigating the Dual Impact of AI in Cybersecurity
Artificial Intelligence (AI) is set to be the newest ally for many companies, but it’s also set to be the newest threat.
SOC 2 Made Simple
Are you tired of filling out lengthy vendor questionnaires and are looking to pursue an SOC 2 examination report instead? Discover some basic practices to secure your customers’ data and pave the way for SOC 2 certification.
On Your DMARC, Get Set, Go!
Google and Yahoo are requiring DMARC beginning in February 2024. So what does that mean for your organization, and how do you implement it?
Who is Watching You and Why?
In the musical words of Rockwell, 🎵 “I always feel like somebody’s watching me - and I have no privacy.” 🎵Who might be watching you through your webcam, and what can you do to stop it?
Deepfakes: Can You Trust What You See?
With hackers having easy access to AI, we can never be sure whether what we are seeing is true or not. We live in an age where information can be easily manipulated so it is critical to learn how to identify and counter these fakes.
Examining the LastPass Breach Through our Password Table
The recent LastPass breach has been rattling around in the news and some researchers believe hackers may have begun to crack some of the stolen passwords. We generated another version of our famous password table for this scenario - read on!
Brand New SEC Cybersecurity Requirements
The new requirements are meant to keep investors apprised of the cybersecurity risks taken by public companies. That includes both your current state as well as any ongoing or future incidents that will need to be evaluated for materiality and then reported within a 4 day period.
HTTPS is Secure (Except When it’s Not)
This may be an unpopular opinion: HTTPS is not secure, or at least not always. Let’s go back in time to review what HTTP and HTTPS are and are not - and some of the ways you can protect yourself online.
Exploring Human Errors in Cybersecurity
You may have thought that hackers wore black suits and rappelled off the roof to hack a company, but that only exists in Hollywood. In real life, human error remains one of the leading causes of cybersecurity breaches.
Data Breach 101: Actions to Take After a Breach
Data breaches are a significant concern here in the digital age. With technology advancing rapidly, hackers have been using various methods to gain sensitive information from unsuspecting individuals, organizations, and you.
#Secure: Locking Down Your Social Media in Style
Social media platforms are essential tools for personal and professional communication. The increasing number of cyber threats means protecting your accounts has become paramount.
Telecommunications: A Case Study
As one of the world’s fastest-growing industries, telecommunication has become a highly vulnerable target for cybersecurity threats. We explore the reasons why.
Keep Calm and Check Your Public Wi-Fi Connection
When it comes to public Wi-Fi, it is “better to be safe than sorry.” Read our guide and secure your Wi-Fi connection when you travel.
Let’s Not Get Smished
Email isn't the only way hackers try to get your information. They can also use text messages to entice victims to click on links in scams known as “smishing.”
Black Friday and Cyber Monday Cyber Scams on the Rise
Holiday shopping season is upon us, but it may not be so jolly if you take risks when shopping online. Read our guide for how to stay safe when shopping for gifts this year!
The Art of (Cyber) War
In the modern age, nation states are expanding the battlefield with targeted cyber attacks on their adversaries. Are you at risk? And why?
RFID: Is it Secret? Is it Safe?
RFID technology is used in a plethora of modern applications. Is it secure, and what should we actually worry about?
The Revival of Raccoon Stealer
The prevalent Raccoon Stealer malware has returned from the dead and is now better than ever - and ready to start stealing your data.