Malware targeting industrial plants: a threat to physical security
April 17, 2019 - When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here's how to protect your workforce and your business from targeted threats.
Who is managing the security of medical management apps?
April 10, 2019 - Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That's why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible?
New research finds hospitals are easy targets for phishing attacks
March 19, 2019 - New research from Brigham and Women’s Hospital in Boston finds hospital employees are extremely vulnerable to phishing attacks. The study highlights just how effective phishing remains as a tactic, and why awareness of email scams is more critical than ever.
Reputation management in the age of cyberattacks against businesses
March 15, 2019 - A business’s reputation takes years to build. With the current climate of data breaches, destroying it can take only seconds. What can businesses do to protect their brands from fallout following a cybersecurity incident? We answer these questions and more.
Key considerations for building vs. buying identity access management solutions
February 28, 2019 - Having a strong identity and access management solution is critical to the security of your organization. It ensures that the right people have access to your system—and keeps unauthorized users out. Should businesses build these solutions in-house or look to third-party vendors to fill the gap? Here are the factors to consider.
Good bots, bad bots: friend or foe?
February 20, 2019 - Bots are an endless source of debate online, but all we ever hear about are the bad ones. In this post, we look at some examples you've probably already run into, and explain why one person's good bot is another organization's bad one.