Disaster recovery planning is a necessary part of business planning, but it involves more than just preparing for the worst-case scenario. Building resilient infrastructure and technology is just as important. By taking this approach, a company ensures that it has the means to respond and adapt to sudden, unpredictable events…
Managers are always pushing their employees to do more with less. The best managers will continuously look for opportunities to streamline bloated processes and reduce operational overheads. Unfortunately, managers are just as likely to become too busy with everyday issues and may no longer have the bandwidth to carry out…
If the number of high-profile breaches last year is any indication, cybercriminals are getting craftier. In 2019, the cybersecurity world saw the rise of new types of phishing attacks, plus brazen attempts to access networks through a variety of clever, new techniques. Cybercriminals stop at nothing to steal the most…
Anyone who has been paying attention to the latest cybersecurity news might have noticed a big story breaking in early December. Two Russian hackers were indicted in what is considered to be the largest cybercrime spree in history. Maksim Yakubets and Igor Turashev are the leaders of Evil Corp, a…
Cyberattacks are forefront in the minds of every business owner, regardless of the type of business or the size or the company. No one is out-of-reach for these unscrupulous criminals. Despite the considerable efforts of IT technicians and sophisticated software designed to detect and prevent unauthorized access to your networks…
Falling prey to clever criminals tricking employees into handing over sensitive corporate data? If not, a company should consider itself lucky. The average employee receives four to five phishing emails per week. Phishing falls into the category of social engineering cyberattacks, which Accenture has identified as one of the most…
Has your IT provider gotten around to developing a man-in-the-middle attack prevention plan just yet? If not, they need to do so—now. Man-in-the-middle (MITM) attacks are another in a long list of schemes hackers use frequently, and companies are surprisingly vulnerable to them. It seems like every day cybercriminals are…
The number of ransomware attacks against public and private entities in the past few years has exploded. What used to be a somewhat uncommon tactic in comparison to phishing and other social engineering approaches is now taking the central spotlight as cyber criminals become aware of a critical shortcoming existent…
Nobody likes preparing for catastrophe—however, not preparing for it will lead to disaster when an emergency arises. When exploring strategies for how to secure important files and data, make sure that frequent backups are a part of the plan. Backups may mean the difference between minimal downtime and mitigated damages,…
The creators of DECSYSTEM-20, a mainframe computer running a proto-operating system, sent out the first spam email to ARPANET users on May 1, 1978. What they perceived as a clever and modern approach to advertising, however, earned them instant and widespread infamy. In fact, the reaction was so severely negative…