Featured Post

EA Data Breach: What Happened, and How it Could be Prevented

Last week, news broke that games publisher Electronic Arts (EA) fell victim to a data breach. While EA won’t say when the incident occurred, the ramifications are clear: the malicious actors made off with a whopping 780gb of data. While no player’s personal data was compromised in the breach, among the stolen data were source [...]

Read More...

EA Data Breach: What Happened, and How it Could be Prevented

Last week, news broke that games publisher Electronic Arts (EA) fell victim to a data breach. While EA won’t say when the incident occurred, the ramifications are clear: the malicious actors made...

Colonial Pipeline Data Breach- Document Malware Likely Cause

Colonial Pipeline got hacked recently. The cyberattack that forced the United States’ largest gasoline pipeline shutdown has triggered fresh questions about the vulnerability of the...

Data Breach Risks from Microsoft Teams

Microsoft Teams has rapidly turned out to be the to-go-to application for remote work, accelerating exponentially in usage over the last twelve months. Teams boasts an impressive 145 million active...

Secure Access Service Edge: What is SASE? And Why It’s the Future for Cloud hosted Tech Stacks

The Software-as-a-Service (SaaS) industry is forecast to generate $157 billion by 2022, as more and more organizations move their workloads to the cloud and embrace the world of hybrid...

HIPAA Deep Dive Series: When is a Patient Authorization not needed for Sharing Personal Data?

HIPAA has strict rules governing patient data storage and sharing. However in limited circumstances, the HIPAA Privacy Rule allows a covered entity to use or disclose a patient’s Protected...

What is the Principle of Zero Trust Security?

Zero Trust security is an IT security model centered around the concept that organizations should verify every person and device attempting to access their systems and data, whether they are inside...

How Remote Work Setups Can Lead to Higher Risks of Sensitive Data Leaks

The benefits of a distributed, remote workforce are plentiful for organizations. From low costs to improved employee wellbeing, it’s easy to see why many companies are planning to let their...

Current Trends in Phishing Emails

Phishing is the single most important risk for employees to introduce malware within organizations. Effective training to spot this risk in incoming emails is table stakes for all organizations, no...

When Documents Attack: Malware Inserted in Attachments

Document-based malware is pretty common these days. An email analysis by Barracuda Networks revealed malware hidden in documents accounts for over 50 percent of all malicious files.  This trend...

What is Sensitive Data?

Every time you sign up for a new service, buy something online or, even apply for a job, you automatically share your personal information. If you look back over the hundreds of online interactions...

Shadow IT 2.0: New Risks in the PaaS Era

For IT and security leaders, the term ‘shadow IT’ tends to send a shiver down the spine. About ten years ago, it became an epidemic in the corporate world. The consumerization of cloud...

What is Data Loss Prevention (DLP)?

Data breaches have become a regular mainstay of daily life. For every security patch or vulnerability disclosure, it seems there’s a corresponding data loss incident somewhere. Consider the...

Request A Demo For Enterprise Solutions