7 tips for storing confidential data
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
656 articles
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
Why using a corporate mail account for personal matters is not a good idea
Having a shared storage and data exchange environment can pose additional risks to corporate security.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.