Don’t lose sensitive data to phishing attacks. Here’s how to educate your employees.

cyber criminalWhat’s the most dangerous security threat? The one your users fall for.

Many of these threats rely on our psychology to trick us into handing over access to valuable and sensitive information. Put another way, criminals use our willingness to help, submission to authority, or ignorance against us. Continue Reading…

Tags: , ,

3 vulnerability and assessment tools that will strengthen your IT ecosystem

snapshot-syndromeDig up your high school yearbook photo and you’re likely in for a laugh — the clothes, the hair styles, the glasses are distant memories for most of us. That snapshot of 18-year-old you is unlikely to be confused with who you are today.

And yet when it comes to IT, many organizations often find themselves the victim of a kind of snapshot syndrome, the common misconception that our environments exist in the state in which they were last measured or assessed. In reality, most infrastructure, policies, and processes are in a continually dynamic state, and just like current you compared to your high school yearbook photo, only a few undergo limited changes. Continue Reading…

Tags: , , , , ,