Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

7 ways to protect remote employees from a cyberattack

Working from home (WFH) has brought with it advantages such as flexibility and access to global talent, but it has also introduced new security threats to organizations. The shift to a remote or hybrid workforce has forced companies to adopt more software-as-a-service (SaaS) applications, which has caused almost 40% of companies to lose control of their IT and security environments, according to data from a Cloudflare study.

Ducktail malware: what is it and why are businesses so concerned about it?

The number of new types of attacks that compromise organizations’ cybersecurity is on the rise. Cybercriminals are more capable than ever of adapting and upgrading their attack formats to circumvent their victims' protection protocols. Data shows that the volume of new attacks is increasing every year. According to Astra, this year we have reached a record number of 560,000 new types of malware detected daily. This brings the number of malware currently in existence to over one billion.

Disk encryption: the key to boosting your MSP service

Storing business data on personal devices and laptops has increased in recent years due to the shift towards hybrid or remote working models. This substantially raises the risk of sensitive information being exfiltrated if employees suffer theft, loss, or accidentally forget their devices.

MSP: 4 capabilities you need to include in your secure Wi-Fi solution

In today’s interconnected world, the growing use of wireless technologies creates greater vulnerability for security breaches. Given the rising number of users, devices, and applications on corporate Wi-Fi networks, organizations need to implement a security solution that can ensure exceptional performance and optimal protection to shield their networks from threats.

The risk behind QR codes, how to protect your business against quishing attacks

Cybercriminals are increasingly using QR codes in their phishing campaigns to trick users and obtain their email account information, credentials, or sensitive data. This tactic to obtain credentials known as quishing, or QR code phishing, was first observed at scale in May of this year, when a group of cybercriminals spoofed Microsoft security alerts asking employees across multiple industries to scan a QR code to update their account security settings.

How AI will Impact the Cybersecurity Industry in 2024

Artificial Intelligence is revolutionizing everything and cybersecurity is no exception. A growing number of industry experts and professionals are beginning to reflect on the benefits and risks of this innovative technology within the cybersecurity framework. AI can be used to enhance protection for businesses against threats but, on the flip side, it can also be applied to refine cybercriminal attacks.

Top 10 Misconfigurations according to CISA

Misconfigurations leave the door open to cybercriminals, which can lead to a range of serious problems, unauthorized access, loss of sensitive information, and disruption of services. In fact, many major data breaches are caused by misconfigurations. Alert to these dangers, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) recently released a joint advisory to warn about the most common cybersecurity misconfigurations in large organizations.

50% of CISOs will adopt practices focused on human behavior

Today, the human factor still plays a role in most cybersecurity incidents. Human error is involved in 74% of data breaches. It’s essential to shift towards designing human-centric controls that promote and facilitate the use of responsible cybersecurity practices among employees.