Reducing Third-Party Risk with Continuous Monitoring

According to a recent study by SecureLink and Ponemon Institute, 51% of organizations have experienced a data breach caused by a third-party. Despite the growing risk third parties pose however, many companies are still not making securing these relationships a priority. The key to effectively mitigating your third-party risk is making it a continuous process,…

Read More

6 Biggest Security-Awareness Program Challenges—And What to Do About Them

When it comes to today’s security challenges, the statistics are alarming. Nearly 7,000 corporate data breaches were reported between 2016 and 2020, with the number rising on average each year. Making matters worse, companies didn’t detect 41 percent of these breaches. And it’s not just big companies getting hit—a whopping  88 percent of small-business owners feel they’re not sufficiently protected…

Read More

Fortifying Users Against Malware through Personalized Campaigns

This article is a repost from SecurityAdvisor Security Challenge: Detecting Malware is Risky Business Between May-August 2020, Emotet was the top malware variant reported in the RH-ISAC community, followed by Ursnif, Trickbot, and .jar malware files. Compared to other threats, intelligence shares concerning specific malware was not quite as common as business email compromise (BEC)…

Read More

Workforce Awareness During COVID-19

As the world scrambles to respond to the outbreak, more and more workers around the globe are working remotely in an effort to contain and mitigate the pandemic. This has opened new avenues for hackers, as in many cases the companies may not have the infrastructure or policies in place to support secure remote working,…

Read More

COVID-19 Phishing Campaigns

The cyberthreats following in the wake of the COVID-19 pandemic are not substantively different from the threats that security professionals have dealt with during other national or global calamities like the Indian Ocean tsunami, Amazon fires, floods, and hurricanes. Sophisticated cybercriminal, state-sponsored threat actors, and hacktivists have always taken advantage of widespread anxieties in times…

Read More