A honeypot is a decoy computer system used to analyze how cyber attackers attempt to compromise a real machine. They are used by both security researchers and companies to determine where to focus their security resources. Could your organization benefit from such a service?
It is no secret that malware is a serious threat to computer systems and networks, costing companies an average of $2.4 million. But what’s the difference between the various types of malware? We’ll take a look at the four most common: viruses, worms, trojans, and ransomware.
On June 4th, 2018, MyHeritage discovered that information about it’s 92 million users had been stolen and published on an external web server. The data was discovered by a security researcher, who immediately provided MyHeritage with the information they found. But what was included in the data, and what do customers need to know?
As we approach the May 25th deadline for the implementation of the EU’s General Data Protection Regulation (GDPR) it is important to know what this is, what it covers, and how it affects companies outside of the European Union.
With the growing number of companies facing data breaches, such as the recent Chili’s breach, it is important to know what to do as a consumer if a company you’ve done business with falls victim. What can you do to keep yourself, your money, and your identity safe after a data breach? Read below to […]
Bug bounty programs provide a successful way for organizations to focus on their information security. Through these programs, researchers are able to routinely look for security flaws in their servers or applications. But could current laws put researchers and organizations in a legal “grey area?” Does enacting a bug bounty program replace a professional penetration […]