What are Mobile Device Security Policies? Smartphones and other mobile devices are increasingly being used to conduct business, which means that businesses need to adopt policies aimed at protecting their organizations data security and privacy, no matter where that information is being accessed. In order to provide employees with the information and knowledge that they […]
Wiper Malware
What is Wiper Malware? Wiper malware is malware that is designed to wipe (erase) the hard disk of a victim’s computer. Wiper malware is being seen more frequently, and it can be achieved through a number of techniques: Overwriting files. With this approach, the cyberattacker simply enumerates the filesystem and overwrites the select files with […]
Tech Support Scams
What are Tech Support Scams? Tech support scams involve scammers using scare tactics to trick you into unnecessary technical support services that are, supposedly, going to repair device or software problems- but those problems do not actually exist. Their objectives are largely financial; they may try to scam money from you by asking you to […]
What is Extended Detection and Response? Extended detection and response, referred to as XDR, is a new approach to threat detection that provides holistic protection against cyberattacks, unauthorized access, and misuse.1 According to Forrester Research, “XDR unifies security-relevant endpoint detections with telemetry from security and business tools such as network analysis and visibility (NAV), email […]
Virtual Private Cloud
What is a Virtual Private Cloud? A virtual private cloud (VPC) is a single compartment within the entirety of a public cloud from a certain provider, similar to a deposit box within a bank vault. A private cloud consists of infrastructure that is dedicated to a single organization, with the organization typically buying the cloud […]
Secure Communication Tools
What are Secure Communication Tools? With an abundance of communication solutions on the market, it may be difficult to select the right software or applications for your needs. Many popular communication tools tout their security features, but it can be difficult to assess which features are nice and which features are necessary for your communication […]
What are Threats to Microsoft Word and Microsoft Teams? Recently, cyberattackers have infiltrated two different Microsoft products- Microsoft Word and Microsoft Teams. Malware-Infested Word Documents A novel strain of malware which goes by the name of SVCReady has been spread through phishing attacks, with most infections occurring among computers that lack antivirus software. The infection […]
What is Merger and Acquisition Data Migration? Data transfer between a buyer and seller is a critical component of a successful merger and acquisition (M&A) transaction. Data ownership is often scattered amongst various locations, platforms, functions, systems, and devices, making it difficult to smoothly handover from seller to buyer. A few of the challenges involved […]
Remote Access Trojan
What is a RAT? A remote access trojan (RAT) is a type of malware that gives a cyberattacker remote access of a computer. Once the cyberattacker has gained control of the computer, they can use the infected machine for a litany of activities including viewing and downloading files, deleting files, editing or implanting data, logging […]
What is the Threat Intelligence Lifecycle? The threat intelligence lifecycle serves as a framework to outline and implement security measures more effectively and efficiently. The threat intelligence lifecycle is a continuous and iterative process of producing intelligence from raw data that allows organizations to develop defensive processes for averting emerging threats and risks. The threat […]