There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ensure you have a comprehensive […]

Being friendly and social can enhance your career, strengthen friendships and overall lead to a happier life. However, we need to be mindful that those social interactions don’t make it easy for cyber criminals to gain valuable sensitive or personal information about our lives.  In a social engineering attack, an attacker uses human interaction (social […]

In the “Verizon 2013 Data Breach and Investigations Report” 80% of cases (examined by Verizon) a breach wasn’t detected for at least weeks, if not months or years.  Once a detection was made the data suggests that in 79% of cases it took days, weeks or months to contain, which is significant because an attacker […]

Threats and vulnerabilities are a way of life for IT admins. With the continued rise of computer and network attacks, the threat of a critical attack is virtually constant. With complex software it is all but guaranteed that there will be vulnerabilities for attackers exploit. And the sheer volume of attack vectors for attackers to […]