There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ensure you have a comprehensive […]

Being friendly and social can enhance your career, strengthen friendships and overall lead to a happier life. However, we need to be mindful that those social interactions don’t make it easy for cyber criminals to gain valuable sensitive or personal information about our lives.  In a social engineering attack, an attacker uses human interaction (social […]

In the “Verizon 2013 Data Breach and Investigations Report” 80% of cases (examined by Verizon) a breach wasn’t detected for at least weeks, if not months or years.  Once a detection was made the data suggests that in 79% of cases it took days, weeks or months to contain, which is significant because an attacker […]