Why you need to tear down your data silos
The ancient Greek storyteller Aesop coined the famous phrase, “United we stand, divided we fall.” Although the world has changed drastically since the first utterance of that wisdom, it applies today – even (or especially) in the realm of data … Read more
How to ensure remote workers follow security guidelines: 4 tips for cybersecurity policy compliance
You’ve probably heard the proverb, “You can lead a horse to water, but you can’t make it drink.” Similarly, you can mandate that your remote workers undergo security awareness training, but if they aren’t properly motivated to comply with your … Read more
Why you’re making a mistake if you don’t have multi-layered cybersecurity
What do onions and effective cybersecurity programs have in common? If you answered that they both have layers, you’re correct. As cybercriminals launch increasingly complex and relentless attacks against all kinds of businesses, combating those evolving threats across all aspects … Read more
Why you need to disable inactive accounts right now: The cybersecurity risks of ‘ghost accounts’
A company grappling with a Nefilim ransomware incident reached out to the security solution provider Sophos for assistance. The Sophos Rapid Response team immediately set out to resolve the incident, according to a Sophos News article. While investigating how the … Read more
Cybersecurity lessons from the discovery and exploitation of the Log4Shell vulnerability
In terms of cybersecurity, 2021 had an eventful end as security researchers identified a significant issue with the Apache Log4j software library. By exploiting the remote code execution (RCE) vulnerability that became known as Log4Shell, bad actors can potentially commandeer … Read more