Blog
4 Key Lessons for Enterprise Mobile Device Security
September 11, 2019
0 Comment
By Ben Canner
As of 2019, the threats to mobile device security continue to grow. In fact, according toVerizon’s Mobile Security Index 2019, mobile device security threats grow faster than any other; 86 percent of surveyed enterprise executives state so outright. Additionally, 67 percent feel less confident about their mobile endpoint security than
Eliminating Cyber Threats in 2020: Why Enterprises Need to Rethink Cyber security
September 10, 2019
0 Comment
By Amal Murali
In 2018, a security issue at Facebook affected a whopping 50 million users. In 2017, 412 million user accounts was stolen from Friendfinder’s sites and 147.9 million customers were affected by the Equifax data breach. Just one year earlier, 3 billion Yahoo accounts were hacked while hackers managed to steal
Digital identity verification is one key to fighting cybersecurity threats
September 10, 2019
0 Comment
By Bill Siwicki
Because of the great amount of personal information involved, medical records command a high value on the dark web and can be listed for up to $1,000 each – 10 times more than the average credit card data breach record. Cybercriminals can then easily obtain this information and impersonate legitimate
Cybersecurity: 99% of email attacks rely on victims clicking links
September 9, 2019
0 Comment
By Danny Palmer
Nearly all successful email-based cyber attacks require the target to open files, click on links, or carry out some other action. While a tiny fraction of attacks rely on exploit kits and known software vulnerabilities to compromise systems, the vast majority of campaigns, 99%, require some level of human input
By Maxine Holt
Blockchain is distributed ledger technology. The premise of blockchain is that everyone involved in the chain has the same version of the truth at the same time. Each block in the chain builds on the previous and each has a unique identifier.Blockchain technology is finding its way into more and