Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2022

What is a Brute Force Attack: How it Works and How to Prevent it

Brute force attacks are nothing new in cybersecurity. As far back as 2015 (eons ago, in technology terms) the global coffee chain Dunkin’ Donuts suffered a brute force attack that targeted nearly 20,000 of its customers. In this attack, cyber attackers used brute force to get unauthorized access to the accounts of more than 19,000 users and steal their money. Following the incident, Dunkin’ Donuts was slapped with a lawsuit, where it ended up paying more than $500,000 dollars in a settlement.

Controls & Risk: Two Sides of the Same Coin

They’ve attacked hundreds of companies and government agencies leveraging just one software update vulnerability. They’ve triggered nationwide gas shortages and price surges all from one compromised password. And they’ve even poisoned public water supplies after INFILTRATING… an unused computer running on Windows 7 with no firewalls and an old password.

What Is the Cost of a Third Party Data Breach?

Data breaches are cybersecurity events that significantly harm a company’s reputation, finances, and compliance posture. When information is leaked or extracted from your database via a third-party partner, that is known as a third-party data breach. These events can have a devastating impact when your company handles sensitive information belonging to clients.

8 Cybersecurity Questions You Should Be Asking Your Vendors

Given the sharp rise of ransomware in recent years, and how cybercriminals have evolved in the tactics they use to launch cyberattacks, organizations must be able to protect their businesses from cyber threats. The more vendors you have in your extended enterprise, the less easy that is.

How the Cloud Can Help with Data Loss Prevention

Data loss can cause tremendous damage to a business. It diminishes trust in your brand and can lead to financial losses from lawsuits, fines for non-compliance, and theft of intellectual property. Data loss prevention (DLP) is the set of practices and tools designed to prevent data leakage through intentional and unintentional misuse. These practices and tools include encryption, detection, preventative measures, educational pop-ups, and even machine learning to identify vulnerabilities.

How Reciprocity Onboarding Services Deliver Lightning-Fast Time to Value

When your organization makes a substantial investment in new technology, the last thing you want is for it to go underused. Digital transformation is intended to make people more productive and give them more time to focus on what matters most. But you can’t reap those benefits unless the onboarding process is swift, smooth, and effective enough to deliver immediate results.