Think of ransomware attacks as virtual kidnapping. Ransomware actors use encryption to hold your devices’ functions and files hostage or lock you out of your system. Then they request a ransom for its release. These actors are mostly motivated... Read More
Blog
7 top trends in cybersecurity for 2022
Cybersecurity has become a critical priority for businesses as they now navigate current threats in 2022. Many trends in cybersecurity are emerging as companies continue to make adjustments due to the threat landscape. The stakes could not be higher... Read More
Family Educational Rights and Privacy Act (FERPA) | Cybersecurity guide
Most have heard of HIPAA, GPDR, and other compliance regulations and best practices that govern data privacy and security for healthcare, personally identifiable information, and other forms of sensitive data. However, when it comes to educational institutions, the Family... Read More
Popular work-related services fail to prevent leaked passwords
Preventing the use of weak and leaked password within an enterprise environment is a manageable task, but what about other services where employees share business-critical data in order to do their work? The researchers at Specops Software investigated the... Read More
Cyber risk management platform Outpost24 joins forces with international investment firm Vitruvian Partners for further global expansion
Stockholm – 13 July 2022: Outpost24 (“Outpost24” or the “Company”), a leading innovator in identifying and managing cybersecurity threats and vulnerabilities, today announced it has partnered with Vitruvian Partners (“Vitruvian”) to power the Company’s next phase of growth. The new... Read More
Vulnerability testing vs. Penetration testing
With the wide range of growing cybersecurity threats creating risks for businesses today, organizations must be proactive in their approach to cybersecurity. The days of reactive security and waiting for cybersecurity incidents are over. The sheer scope, scale, and... Read More
Ransomware Prevention Best Practices
A thriving industry of holding data hostage has emerged out of the malicious software known as ransomware. The FBI’s Internet Crime Complaint Center (IC3) states in its Internet Crime Report for 2020 that it received a record number of... Read More
A look at cybersecurity funding in the Infrastructure Investment and Jobs Act
President Joe Biden passed the Infrastructure Investment and Jobs Act (IIJA) in November 2021, allocating more than $1 trillion in federal capital to improve the nation’s infrastructure. The money from this bill will go toward a wide range of... Read More
Remote desktop protocol TCP port 3389 security risks and vulnerabilities
There is no question that we’ve seen businesses scrambling to meet the needs of the distributed workforce. Many different remote access technologies allow businesses to provide the connectivity needed for remote employees to access business-critical applications. Remote Desktop Protocol... Read More
Passwordless realities of Entra ID (formerly Azure AD) Temporary Access Pass
One of the new movements in authentication technology is called passwordless authentication. With passwordless authentication, end-users can use other means to sign in aside from the traditional password. Microsoft’s Temporary Access Pass for Microsoft Entra ID (formerly Azure Active... Read More