What is ATT&CK and How Can It Protect Your Business from Cyber Threats
In the cybersecurity community, there always seems to be a new acronym to learn. ATT&CK, however, has been a well-respected model that many professionals have stood behind for years.
Lessons from Penetration Testing: 7 Real-World Findings
The internet today is swarming with cybercriminals just waiting for the right opportunity to gain a foothold into your organization's network. One of the best ways to stay ahead is to find your organization's weak spots before cyber criminals do.
4 Lessons Learned from the Top Data Breach Lawsuits & Class Action Settlements
It’s always news when corporations have security breaches. This is especially true whenever malicious hackers gain access into a company’s internal databases to steal information— such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations or intellectual property. Often, these data breaches can lead to lawsuits and other legal action against the victim company.
8 Password Security Tips from Kevin Mitnick for Better Login Protection
When is the last time you truly considered your password strength and security? While password cracks don’t make the news quite as often as other breaches, they can compromise your systems all-the-same.
Why Penetration Testing is More Important than Ever in 2020
Early 2020 has been an unprecedented year for businesses, not only across our great nation, but the world at large. Enterprises big and small have shut their doors— and for those that require a storefront or face-to-face interactions to deliver products and services, operations may have come to a grinding halt.
With stage events coming to a dramatic halt during the COVID-19 pandemic, event planners and speakers are forced to pivot. To stay agile during this uncertain time, many companies are beginning to host virtual events.
Hackers use clever ploys to trick you into disclosing personal information— all with the end goal of acquiring sensitive data or money. These ‘social engineers’ gather intel on you and use social tactics to manipulate and deceive you into granting them entry into your systems.