Cyber Resilience Insights

SUBSCRIBE NOW

Email Security
A Podcast About Risk, Reward and Ridiculousness: Welcome to Phishy Business

Learn Why Difference (and Mints) are Cybersecurity Strengths in Our First Episode  We… Read More >

Learn Why Difference (and Mints) are Cybersecurity Strengths in Our First Episode  We all know a business’ cybersecurity is only as strong as its people. And that’s where Jenny Radcliffe comes in. Known as the People Hacker, Jenny is a psychologist and social engineer who helps her … Read More >

Nick Deen

by Nick Deen

Senior Marketing Manager

Posted Mar 02, 2021

Email Security
The Boring Life of Cybercriminals

Researchers see dissatisfactio… Read More >

Researchers see dissatisfaction in the lower ranks of cybercrime enterprises. Law enforcement could take advantage of it… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Feb 24, 2021

Archive and Data Protection
Q&A: Protecting Data Privacy and Security as the Number of Digital Identities Surge

Digital identity technologies including blockchain and biometrics are pieces of a bigger p… Read More >

Digital identity technologies including blockchain and biometrics are pieces of a bigger puzzle that empowers users to be in more control of their data. Key Points: Security and privacy practices can be more efficient when people have increased control of their data. Every industry needs to have ef… Read More >

Mercedes Cardona

by Mercedes Cardona

Contributing Writer

Posted Feb 22, 2021

Email Security
False Positives Continue to Dog Cybersecurity Industry

False positive security alerts… Read More >

False positive security alerts will keep draining cybersecurity team resources and performance until automation is fully… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Feb 18, 2021

Archive and Data Protection
POPIA 101: The Basics of South Africa’s New Data Privacy Act

POPIA is changing the way South African organisations handle personal data. Here’s w… Read More >

POPIA is changing the way South African organisations handle personal data. Here’s what you need to know. Key Points: POPIA became effective July 1, 2020, and South African organisations have until June 30, 2021 to become compliant. The regulation gives individuals increased control over how … Read More >

Miranda Nolan

by Miranda Nolan

Security Writer

Posted Feb 16, 2021

Email Security
What Is an Email Blocklist? How to Check and Get Yourse…

Email blocklists are intended … Read More >

Email blocklists are intended to thwart spam. But legitimate email marketers can find themselves blocked if they’r… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Feb 12, 2021

Popular Posts

Older Posts

Email Security, Web Security

How to Protect Your Database Against Password Leaks

Cybercriminals want the companies they target to leak passwords. These strategies and tactics help prevent password database leaks.  Key Points: Passwords are still a key factor in 80% of cyberattacks and a growing concern for security professi…

Read More >

Email Security, Archive and Data Protection

Gmail Outages and Cloud Downtime: How to Ensure Business Continuity

The recent high-profile Gmail outage was part of a troubling increase in cloud service breakdowns. Organizations need to revise their planning for business continuity. Key Points: December’s Gmail outage was not an isolated incident in the cl…

Read More >

Email Security, Web Security

Preventing Data Loss from Blended Threats

Blended threats are a growing cybersecurity challenge for businesses of all sizes. Preventing data loss from blended threats is possible, but hard. Key Points: Blended threats attack organizations through many channels simultaneously, whether for in…

Read More >

Security Awareness Training

To Raise User Security Awareness — Don’t Coddle Them

Attempting to train users by exposing them to sample phishing emails can backfire if the examples used are too easy to detect. Key Points: Limiting cyber awareness training to phishing emails that are easy to spot can backfire. To be effective, trai…

Read More >

categories

Read More >

View More

Popular Posts