Posts for category: Best Practices Weekly Summaries

Software Updates

Executive Summary Neglecting software updates exposes devices to security vulnerabilities. This can be the cause of access without permission, data breach, and financial damage. Enabling automatic ...

Zero Trust Security

Executive Summary Zero Trust Security is a cybersecurity paradigm that assumes that users and devices should never be trusted implicitly. Zero Trust deployment reduces the risk of unauthorized ...

Social engineering via AI

Executive Summary  AI-based social engineering is a new cyber security attack that is growing at a phenomenal speed. These attacks may end up with data leakage, financial, or reputational damage. ...

Phishing

Executive Summary  Phishing is a cyber attack that fraudulently induces victims into disclosing private information. Such an attack may result in financial damage, identity theft and/or a very ...

Complementary User Entity Controls

Executive Summary Complementary User Entity Controls are conditions a third-party vendor requires its customers to implement in order for the product to work as intended.  Enterprise customers must ...

Remote Workers

Executive Summary Nation-State advanced persistent threats (APTs) infiltrate US businesses by disguising themselves as remote workers, consultants and vendors. Often, international fraudulent ...

Social Engineering

Executive Summary Threat actors use social engineering to manipulate users into performing actions on their behalf. It works by exploiting a natural emotional stress response that causes victims to ...

QR Codes

Executive Summary QR codes offer a convenient mechanism to distribute information for benefic and malefic purposes. Malicious QR codes can distribute malware and steal sensitive information. Threat ...

Ransomware and Small Business

Executive Summary Ransomware attacks are especially damaging for small businesses due to resource limitations. Businesses risk failure without a resilience plan that is able to address such an ...

Building a Culture of Cyber Safety

Executive Summary Unsecure habits in the workplace create unintentional threats to an enterprise’s cyber posture. Leadership can create a culture of cyber safety by modeling good cyber habits and ...