Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout

Mobile Threat Defense: Safeguarding Your Data on the Go

Smart devices are everywhere — and one common cybersecurity myth is that security teams don’t need to worry about sensitive data stored on them. However, in a landscape where 75% of organizations have experienced phishing attacks against their employees, a robust security posture that includes coverage of your employees' personal tech is a must.

How to Use a Risk-Based Vulnerability Management Model to Secure Mobile Dev

The typical workplace of the information age is no longer an office cubicle with a desktop PC. It’s an airplane seat, a comfy cafe chair, and a kitchen table — and it may not even have a company-issued device at its center. Research shows the productivity gains made possible by the growth of bring-your-own-device (BYOD) policies. Yet empowering employees to do their best work wherever they are and with whatever devices they have at their disposal also comes with risks.

Urgent Text from the CEO? Think Twice Before Responding

Imagine this: You’ve just started a new job at a new company when you get a text message that says it's from the CEO. They are requesting that you take care of a time-sensitive task. At first, you may think it’s a real request, but it’s more likely a pernicious form of SMS phishing known as executive impersonation, or CEO fraud. As we continue to rely on mobile devices for work, attackers are getting smarter about how they exploit our trust in these devices against us.

Data Security Best Practices: 7 Tips to Crush Bad Actors

In today’s hyper-connected world, it’s becoming increasingly difficult to ensure your data is protected. With users accessing networks from multiple locations, data passing through unpredictable endpoints, and a rampant increase in cybercrime, establishing and maintaining data security best practices has never been more important. According to the Identity Theft Resource Center, there were 2,365 cyber attacks in 2023, a 72% increase over 2021.

Top Strategies for Preventing Accidental Data Shares in Real Time

In today’s cybersecurity landscape, it’s not enough to guard against external threats. Employees have access to so much sensitive information and so many ways to share it that it’s easier than ever to leak data accidentally. These accidental data shares can jeopardize your organization’s compliance standing, expose your systems to threat actors, and cost you business. Everyone makes mistakes.

The Rise of ZTNA: A Seamless Path to Remote Access

Working remotely using cloud applications is now the norm for getting things done. But while these shifts offer greater flexibility, they also bring new security challenges. For years, virtual private networks (VPNs) were the go-to solution for securing remote access. But when used at such a large scale, VPNs are inefficient, slowing users down and undoing the productivity gains that come along with remote work. Worse, they expose organizations to unnecessary security risks like lateral movement attacks.

Protecting Sensitive Data Sharing on Social Networking Sites

As organizations embrace social media for networking, marketing, and recruiting, platforms like Facebook, Instagram, LinkedIn, and X (formerly Twitter) have become integral to business operations. While social networking sites offer numerous benefits for productivity, collaboration, and engagement, they also introduce significant security challenges, particularly concerning the handling and potential exposure of sensitive data.

Remote Access Security: 5 Best Practices for Remote Workers

Remote and hybrid workplaces are here to stay. In August 2023, 20% of U.S. employees worked from home at least once. By 2025, more than 36 million U.S. employees will work remotely, up from 19 million in 2019. That’s good news for employers who want the widest talent pool and employees who want to do their best work from anywhere. However, it’s also potentially good news for cyber criminals, who can exploit remote access policies to compromise cloud data.

What Is a Modern Breach and How Can It Be Prevented?

In the modern world, data is a precious asset. That means malicious actors will go to great lengths to get their hands on your organization’s information — and if that information is in the cloud, it’s especially vulnerable to those outside forces. You likely have some cybersecurity measures in place, but are you prepared for modern breaches that use constantly evolving tactics to exploit vulnerabilities and gain access?

Safeguarding Sensitive Information in the Age of Generative AI

Since its debut in 2022, ChatGPT has radically reshaped the way we interact with technology. Generative AI (genAI) platforms like ChatGPT, Google Gemini, and Meta AI have rapidly gained in popularity, offering capabilities that range from rewriting text to generating creative content. While these tools have created new opportunities for enhanced productivity, they’ve also introduced new security risks — particularly when users unknowingly share sensitive information.