What is Cross-Site Request Forgery? Cross-site request forgery (CSRF) cyberattacks are common web application vulnerabilities that take advantage of the trust that a website has already granted a user and their browser by tricking the web browser into executing an unwanted action in an application that the user is already logged in to. CSRF cyberattacks […]
Category: Outsourced IT
FinTech
What is FinTech? FinTech (financial technology) is a term broadly referring to software, mobile applications, and other technologies created to improve and automate traditional forms of finance for individuals and businesses. A FinTech company refers to any business that uses technology to modify, enhance, or automate financial services for businesses or consumers.1 Examples of FinTech […]
What is Enterprise Security Risk Management? Enterprise Security Risk Management (ESRM) is a strategic approach to security management through the use of risk management principles. This management philosophy can be applied to any area of security and any task performed by security, such as physical security, cybersecurity, information security, investigations, loss prevention, organizational resilience, brand […]
Insider Threats
What are Insider Threats? The Department of Homeland Security (DHS) defines an insider threat as the “…threat that an employee or a contractor will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States.”1 Insider threats are not only threats to national security, but they are […]
What is Intentional Electromagnetic Interference? Electromagnetic interference (EMI) is all around us, in both natural and man-made forms. EMI is unwanted noise or interference in an electrical path or circuit that is caused by an outside source. EMI can cause electronics to malfunction or to fail. Examples of EMI sources include lightning, solar flares, radio […]
What are Busy Seasons for Ransomware Attacks? There has been a rise in ransomware attacks on agricultural cooperatives and the FBI has warned that ransomware attacks are more likely to strike agricultural cooperatives during critical planting and harvesting seasons.1 As ransomware attacks are likely to disrupt operations, cause financial loss, and negatively impact the food […]
Network Segmentation
What is Network Segmentation? Network segmentation is a process of dividing a network into multiple zones and applying specific security protocols to each zone. The primary goal of network segmentation is to have increased control over the management of security and compliance. Network segmentation, also known as network partitioning or network isolation, makes it difficult […]
Script Kiddies
What are Script Kiddies? Script kiddies is a term that dates back to the 90s and refers to novice hackers. Not all novice hackers are referred to as script kiddies, however. Many novice hackers make efforts to educate themselves about the hacking tools and resources that they are using. In contrast, script kiddies are novice […]
Security Analytics
What is Security Analytics? Security analytics is an approach to cybersecurity that detects potential threats to IT systems through a combination of data collection, data aggregation, software, algorithms, and analytic processes. Security analytics applications use real-time data and historical data for threat detection and diagnosis. Sources of data include: Security analysts can incorporate different combinations […]
Bossware
What is Bossware? Bossware is software to be aware of, whether you have a boss, or the boss is you. Bossware is a term that encompasses any form of employee productivity or performance monitoring software. The pandemic saw a dramatic rise in remote work and a concurrent rise in the number of employers wanting assurances […]