Why Routers are the Neglected Endpoint and How to Protect Them
October 31, 2018 | Dan Kaplan
If you are like most people, the only time you think about your routers is when ...
9 Awesome Resources to Sharpen Your Security Skills
October 11, 2018 | Dan Kaplan
National Cyber Security Awareness Month spans October - even though we know all ...
A Complete Tutorial on Rolling Out Microsoft Office 365 Securely
September 28, 2018 | Thad Mann
Microsoft Office 365 (O365) is more than a service that provides employees with ...
The Supply Chain is Only as Strong as its Weakest Link: How You Can Better Defend Against Third-Party Cyberattacks
September 19, 2018 | Dan Kaplan
A particularly unfair aspect of a maturing cybersecurity program is that even ...
The Cliffs Notes Version to Addressing the Ransomware Threat at Schools
August 23, 2018 | Dan Kaplan
It's back to school time: for teachers, students…and cybercriminals.
Charlie Discovers Security Testing
February 27, 2018 | Dan Kaplan
You may remember our "Security Testing Practices and Priorities" report, which ...
A 4-Step Process for Softening the Blow of a Zero-Day Vulnerability
October 25, 2017 | Dan Kaplan
Halloween is almost here, and if you want to bring out the fright in security ...
9 Pen Testing Essentials for Making ATMs Less Hackable
October 18, 2017 | Dan Kaplan
Criminals fancy ATMs for the same reason cybercriminals do: convenience. There ...
How to Eliminate Common Sources of Employee Fraud
October 11, 2017 | Guest Post
While you want to believe all your employees are loyal and trustworthy, many ...
Protecting Your Mobile Data: Advice from an Ethical Hacker
September 27, 2017 | David Jorm
Face it: Your employees love their mobile applications. The average person uses ...
9 Steps to Slowing and Stopping Your Next Data Breach
September 20, 2017 | Dan Kaplan
Data breaches are such an anxiety inducer because you never know when they're ...
7 Powerful Pointers to Help Thwart Email-Based Attacks
July 12, 2017 | Dan Kaplan
While alternative options for functional communication channels are steadily ...
How Small Retailers Can Take Their Cybersecurity from Zero to 60
June 30, 2017 | Guest Post
A laundry list of major companies of which you've almost certainly been a ...
How to Defend Your Industrial Control Systems: 8 Practical Steps
June 27, 2017 | Dan Kaplan
Ask virtually any security expert to name the most nightmarish scenario related ...
What to Do When You‘re Getting Phished but Have No Idea Because It Looks Totally Authentic
May 04, 2017 | Dan Kaplan
A "huge, startlingly fast-moving, and perplexing" phishing attack made its way ...
How to Thrive as a CISO in 2017
January 05, 2017 | Dan Kaplan
The job of a cybersecurity executive is a test in resilience and ...
10 Ways You and the Board Should Share the Security and Risk Burden
December 08, 2016 | Dan Kaplan
Never mind sophisticated hackers, advanced attacks or naïve employees, one of ...
How You Can Help Dodge a Web Application Attack
December 06, 2016 | Dan Kaplan
Despite the rise of emerging technologies like cloud and mobile - and the ...
Why Point-of-Sale Malware Isn’t Going Away – And What You Can Do About It
December 05, 2016 | Dan Kaplan
Many shoppers are now doing as much dipping of their credit and debit cards as ...
14 E-Commerce Cybersecurity Pointers to Survive the Holidays
November 16, 2016 | Dan Kaplan
Before the holiday cheer can arrive, online retailers must face the usual ...
Introducing the Managed Security Services Provider Decision Guide
August 11, 2016 | Dan Kaplan
If you're like me, you hate making decisions. This explains why, for example, I ...
Did You Forget to Migrate Off Windows Server 2003?
July 20, 2016 | Dan Kaplan
Eighteen percent of businesses are still running Windows Sever 2003, the server ...
When Your CEO Isn't Your CEO: 4 Ways to Help Avoid the Scam
July 07, 2016 | Dan Kaplan
Business executives have long served as optimal marks for digital con artists. ...
How to Better Secure the Endpoint: 5 Elements of a Successful Strategy
June 23, 2016 | Dan Kaplan
Endpoints are everywhere and, at the same time, nowhere. Whether it is a laptop ...
How to Stay on Top of the EU General Data Protection Regulation
June 08, 2016 | Jane Dotsenko
New data protection rules in the European Union have now been published after ...
9 Powerful Ways to Help Prepare for a Data Breach
May 10, 2016 | Dan Kaplan
Do you ever have that dream where you're back in college and you've somehow ...
5 Highly Effective Ways for Law Firms to Protect Client Data
March 30, 2016 | Jane Dotsenko
Cybercrime is evolving rapidly and targeting all types of businesses. Where ...
What to Do About Social Engineering and POS attacks in the Hotel Industry
March 21, 2016 | Jane Dotsenko
Think about your average hotel lobby on a busy day. Likely there will be ...