by Peter Burg | Dec 14, 2022 | Blog Posts
Although online shopping during the holidays can be great for missing out on the crowds, long lines and saving time, it also leaves millions of people vulnerable to online shopping scams. In 2021, a baffling $337 million was stolen from American shoppers online....
by Samantha Parker | Dec 7, 2022 | Blog Posts
Cyber Criminals Have Holiday Cheer Too (But for a Different Reason) As all of us welcome this holiday season with cheer- cyber threat actors also welcome a new and cheerful opportunity to exploit your organization’s cybersecurity in the hopes of a big holiday...
by Tony Pietrocola | Dec 2, 2022 | Blog Posts
Cybercriminals are known for their relentlessness and ability to exploit hidden vulnerabilities and misconfiguration errors across a firm’s applications, endpoints, servers, and networks. Vulnerabilities can be one of the biggest threats to a firm’s network; that’s...
by Samantha Parker | Nov 29, 2022 | Blog Posts
It’s the end of November 2022, and the numbers are in– below is a list of the most malicious cyber-attacks over the past month. As reported by Kon Briefing, cyber-attacks have affected more than 19 countries worldwide this month, with an estimated 56 breaches...
by Gillian Sweny | Nov 17, 2022 | Blog Posts
Reliance on Space Assets As the number of satellite systems orbiting in space continues to grow, so does society’s dependence on these assets for the functioning of critical systems. Specifically, satellites are integral for functioning security systems:...
by Peter Burg | Nov 9, 2022 | Blog Posts
Origin of the FTC Safeguards Rule The origins of the FTC Safeguards Rule can be traced back to the 1999 Gramm-Leach-Bliley (GLBA) act requiring financial institutions to document how they handled confidential customer data. Branching off this, in 2003, the Safeguards...