How to Defend Against Malvertising Drive-By Attacks

Many longtime internet users will remember receiving pop-up ads warning that their computers were infected with a virus. In nearly all cases, the ad’s specific claims were bogus; the purpose was to scare users into paying for a questionable tech support service or to drive them to a site that would actually infect them with…

GDPR’s impact: The first six months

GDPR is now six months old – it’s time to take an assessment of the regulation’s impact so far. At first blush it would appear very little has changed. There are no well-publicized actions being taken against offenders. No large fines levied. So does this mean its yet another regulation that will be ignored? Actually…

How to Achieve Ransomware Recovery — Without Paying Ransom

Without a ransomware recovery strategy, companies sometimes end up paying to retrieve their data after an attack. At the same time, threat actors are growing more sophisticated in their ability to bypass both antivirus and anti-ransomware tools — thus, they’re also growing bolder. To stay ahead of the curve, organizations will need to develop more…

Facebook Responding to US Regulators in Data Breach Probe

Facebook acknowledged Tuesday it was facing multiple inquiries from US and British regulators about the major Cambridge Analytica user data scandal. The leading social network offered no details but its admission confirmed reports of a widening investigation into the misuse of private data by Facebook and its partners. “We are cooperating with officials in the…

Thousands of Organizations Expose Sensitive Data via Google Groups

Google has issued a warning to G Suite users after researchers discovered that thousands of organizations expose sensitive information through misconfigured Google Groups instances. The Google Groups service allows users to create mailing lists, host internal discussions, and process support tickets. These types of communications can include highly sensitive information, which is why it’s important…

GDPR Is Here: Resources for Your Compliance Journey

Today is the day. After all the build-up, the GDPR deadline is officially here. From the inevitable next breach, we will more fully understand how well organizations prepared and the implications of this far-reaching regulation. The regulation is designed to better address the protection of personal data, so much of the buzz around GDPR has…

Mobile first: Security concerns and solutions

The majority of people – 83%, in fact – use their mobile devices to go online. 89% of these users connect to the internet via a mobile device every day. However, their security is severely lacking in almost all aspects. As advanced as their connectivity is, mobile users rarely know how to ensure their device safety. 28% of…