Executive Summary Neglecting software updates exposes devices to security vulnerabilities. This can be the cause of access without permission, data breach, and financial damage. Enabling automatic ...
Posts for category: Best Practices Weekly Summaries
Executive Summary Zero Trust Security is a cybersecurity paradigm that assumes that users and devices should never be trusted implicitly. Zero Trust deployment reduces the risk of unauthorized ...
Executive Summary AI-based social engineering is a new cyber security attack that is growing at a phenomenal speed. These attacks may end up with data leakage, financial, or reputational damage. ...
Executive Summary Phishing is a cyber attack that fraudulently induces victims into disclosing private information. Such an attack may result in financial damage, identity theft and/or a very ...
Complementary User Entity Controls
Executive Summary Complementary User Entity Controls are conditions a third-party vendor requires its customers to implement in order for the product to work as intended. Enterprise customers must ...
Executive Summary Nation-State advanced persistent threats (APTs) infiltrate US businesses by disguising themselves as remote workers, consultants and vendors. Often, international fraudulent ...
Executive Summary Threat actors use social engineering to manipulate users into performing actions on their behalf. It works by exploiting a natural emotional stress response that causes victims to ...
Executive Summary QR codes offer a convenient mechanism to distribute information for benefic and malefic purposes. Malicious QR codes can distribute malware and steal sensitive information. Threat ...
Executive Summary Ransomware attacks are especially damaging for small businesses due to resource limitations. Businesses risk failure without a resilience plan that is able to address such an ...
Building a Culture of Cyber Safety
Executive Summary Unsecure habits in the workplace create unintentional threats to an enterprise’s cyber posture. Leadership can create a culture of cyber safety by modeling good cyber habits and ...