The search found 3763 results.
Blog
Active Directory (AD) is so ubiquitous on Windows networks that many organizations have not invested time optimizing the tool. However, this consideration is critical. Your AD configuration has significant process and network security implications, so it’s important that you prioritize a review of how you’re currently managing the service. Here are a few guidelines to follow as you assess your current set up:
DO
Blog
Though the days of robbing banks aren’t over, the attacks on the financial services sector have definitely evolved. Instead of coming up with an elaborate plan that includes avoiding the inevitable security cameras outside a bank, people with malicious intent are choosing a route that gives them access to a wealth of information from to comfort of their home, a cyberattack.
Blog
For many, creating a password starts with something easy. A pet’s name, a birthday, some even simply settle for the simple “password.” The truth is, any easy to remember password is likely easy to guess.
Blog
We live in a world that wants to connect everything and anything that it can to the Internet, and because of this, it seems that everything we buy today is “smart”— our fridges, our phones, and even our wearable devices.
Blog
At the beginning of 2018, experts in the cybersecurity field predicted that bad actors attacking surfaces would continue to be a huge trend. Along the same lines, it’s widely accepted that hackers will take the easiest route available to either breach data, place a form of malware on a network, or just cause disruption.
Blog
With the attack on the City of Atlanta, hackers targeting critical infrastructure shouldn’t come as a shock. Long gone are the days of hackers only targeting credit card information; they are looking to disrupt the things we take for granted—and right now hackers are feeding off third-party access to critical infrastructure.
Blog
If you have already moved on from the Saks Fifth Avenue and Lord & Taylor breach that broke earlier this week affecting 5 million credit cards, don’t worry, another breach happened to other well-known corporations. This breach affected more people and their personal information, and it all stemmed from a third party.
Blog
Grab a burger at Sonic or roast beef sandwich from Arby’s and watch a new episode streaming on Netflix in your hotel room—what do these consumer-related activities have in common? Each retail business was hacked through a third party connection in the last year.
Blog
A recent study indicated that healthcare data breaches are at a four-year low. However, this statistic is pretty misleading. Why? Because so far, the number of breaches are pretty on-par with past years.
Blog
Every healthcare organization knows about the Health Insurance Portability and Accountability Act (HIPAA). It’s part of daily life for those working in a healthcare setting, and it can be — from a cybersecurity perspective — a difficult set of regulations to navigate.