Cyber Resilience Insights

SUBSCRIBE NOW

Web Security, Threat Intelligence Hub
DOS Attacks Explained: What They Are and How To Prevent Them

A denial-of-service attack can disrupt an organization’s website and network, result… Read More >

A denial-of-service attack can disrupt an organization’s website and network, resulting in a loss of business and other costs without the right prevention tactics.  Key Points: Denial-of-service (DoS) attacks make networks and the resources that rely on them inaccessible for those who u… Read More >

Stephanie Overby

by Stephanie Overby

Contributing Writer

Posted Aug 03, 2021

Email Security, Archive and Data Protection, Security Awareness Training, Web Security
12 Cybersecurity Best Practices to Adopt in 2021

Every organization is vulnerab… Read More >

Every organization is vulnerable to increasingly damaging cyberthreats, but best practices can help them mitigate the ri… Read More >

Stephanie Overby

by Stephanie Overby

Contributing Writer

Posted Jul 28, 2021

Archive and Data Protection
POPIA Poses Privacy Conundrum: How to Archive Email?

South Africa’s New Privacy Law Requires Data Archives That Prevent Tampering Yet At … Read More >

South Africa’s New Privacy Law Requires Data Archives That Prevent Tampering Yet At The Same Time Allow Corrections. Key Points: Companies must safeguard South African citizens’ personal information from unauthorized access and tampering under the new POPIA law. The law also permits ind… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Jul 21, 2021

Email Security
What Are the Top Cloud Computing Security Risks?

Despite Its Many Benefits, Clo… Read More >

Despite Its Many Benefits, Cloud Computing Poses Serious Security Risks That Companies Should Understand to Protect Thei… Read More >

Gayle Kesten

by Gayle Kesten

Posted Aug 02, 2021

Email Security
Outlook Digital Signatures: Are They Sufficient for Secure Emails?

Digital signatures in Outlook are an effective line of defense against email from unknown … Read More >

Digital signatures in Outlook are an effective line of defense against email from unknown sources and phishing attacks. We break down the mechanism behind digital signatures, how to set them up and how they secure Outlook. Key Points An Outlook digital signature is a digital identifier that validat… Read More >

Daniel Argintaru

by Daniel Argintaru

Contributing Writer

Posted Jul 29, 2021

Archive and Data Protection
Data Encryption: How to Protect Data in Transit, Data i…

With data growing in volume an… Read More >

With data growing in volume and scope, companies need to know the best encryption methods for the three states of data t… Read More >

Daniel Argintaru

by Daniel Argintaru

Contributing Writer

Posted Jul 22, 2021

Popular Posts

Older Posts

Brand Protection

Complete Guide to Google Workspace DMARC Record Setup

How to protect your business and your brand from spoofing by setting up DMARC in Google Workspace. Key Points: Implementing the DMARC email authentication protocol in Google Workspace can safeguard your brand. DMARC policies can be set to reject, qu…

Read More >

Email Security

Episode #11 of Phishy Business: Resilience – a key component to sporting (and cyber) success

We’re gearing up for a summer of sporting excellence this year with the delayed Summer Olympics and Paralympics. On this week’s episode, we speak to Dutch Paralympian and world champion, Jetze Plat, and his coach and sports doctor Guido V…

Read More >

Email Security, Web Security, Threat Intelligence Hub

Protecting Your Supply Chain From Ransomware

Partner access to your corporate network may make good business sense, but your organization’s risk of attack rises if they lack cybersecurity savvy.   Key Points: Enterprises are doing business with a growing number of third parties…

Read More >

Brand Protection, Threat Intelligence Hub

How Cybercriminals Attack Brands with Marketing Tactics

What to do when cybercriminals use a company’s brand to con people with link manipulation, website spoofing, social media impersonation and fake texts. Key Points: Cybercriminals use common marketing tactics to connect with their “marks.…

Read More >

categories

Read More >

View More

Popular Posts