What to do when you discover a data breach - You've discovered that your organization has been breached. Now what? Learn which steps to take in the immediate aftermath to limit the damage and preserve your company's reputation.
Malware targeting industrial plants: a threat to physical security - When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here's how to protect your workforce and your business from targeted threats.
Who is managing the security of medical management apps? - Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That's why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible?
New research finds hospitals are easy targets for phishing attacks - New research from Brigham and Women’s Hospital in Boston finds hospital employees are extremely vulnerable to phishing attacks. The study highlights just how effective phishing remains as a tactic, and why awareness of email scams is more critical than ever.
Reputation management in the age of cyberattacks against businesses - A business’s reputation takes years to build. With the current climate of data breaches, destroying it can take only seconds. What can businesses do to protect their brands from fallout following a cybersecurity incident? We answer these questions and more.
Key considerations for building vs. buying identity access management solutions - Having a strong identity and access management solution is critical to the security of your organization. It ensures that the right people have access to your system—and keeps unauthorized users out. Should businesses build these solutions in-house or look to third-party vendors to fill the gap? Here are the factors to consider.
What K–12 schools need to shore up cybersecurity - We discuss the challenges facing K–12 schools looking to protect students' data, and which solutions they can adopt in order to build up defenses and increase cybersecurity awareness.
Good bots, bad bots: friend or foe? - Bots are an endless source of debate online, but all we ever hear about are the bad ones. In this post, we look at some examples you've probably already run into, and explain why one person's good bot is another organization's bad one.
Businesses: It’s time to implement an anti-phishing plan - If your organization doesn't have an anti-phishing plan in place, it's time to start thinking about one. Here's what to tell your employees and customers about phishing attacks.

Select your language