Posts tagged with "Cybersecurity"



Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Public Security Announcement: Microsoft Teams Vulnerabilities
Blog | Endpoint Protection · 01. November 2022
This week we highlight Microsoft Teams vulnerabilities and advise how you can protect and secure your infrastructure. Click to learn more.

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Lessons Learned from a Major Hack
Blog | Endpoint Protection · 04. October 2022
What Happened? Recently, a prominent ride-hailing and food delivery company suffered a major cybersecurity attack; the hacker(s) managed to penetrate the organization’s internal network and gain access to their back-end systems, including the ones storing private and sensitive customer data. Data exfiltration was neither confirmed nor denied, but several internal services, including internal communications seem to have been disrupted, rendering them temporarily unavailable or unusable,...

Data Loss Protection vs. Data Leakage Prevention
Blog | Expert's view · 21. September 2022
Your security posture is made up of many critical components - including network, hardware, software suite, policies, data, and people – that all combined deliver an overall status of an organization’s cybersecurity readiness. In previous blog posts, we talked about the growing need for organizations to strengthen their security posture by way of a cybersecurity plan.

Which secure messaging solution to choose?
Blog | Expert's view · 07. September 2022
Companies operating in regulated sectors in the US, like finance or healthcare, are legally required by federal laws to archive all their business communications, including emails, SMS, and other electronic messages; this is an effort to ensure employees are not avoiding or bypassing anti-fraud or antitrust laws. Civilian government and Department of Defense organizations are now being asked to maintain SMS and call logs to comply with records maintenance and FOIA request requirements.

Cybersecurity Awareness
Blog | Expert's view · 23. August 2022
No matter the size or area of business, all organizations must have a proper cybersecurity strategy in place to protect their infrastructure and data from growing cyber-attacks. However, no matter how much time and money are invested in deploying and later maintaining the best, state-of-the-art solution, it is simply not enough. Contrary to popular belief, most security breaches are not the action of a malicious, external party but come from the inside, usually due to human errors from our very...

Solution Highlight: Lookout Security Platform
Blog | Endpoint Protection · 10. August 2022
In previous blogs posts, we talked about the growing need for organizations to strengthen their security posture by way of a cybersecurity strategy. This strategy should keep their data secured, comply with evolving regulations, and respect user privacy at the same time. We also presented different products and solutions to address such security challenges from different perspectives. This week, we want to present you with an option to address all these challenges from a simple yet efficient...

Data Loss Protection vs. Data Leakage Prevention
Blog | Expert's view · 26. July 2022
In a recent blog post, we introduced called Data Loss Protection (DLP), a security component and part of Zero Trust (ZT) architecture that is designed to help corporations protect information and avoid unauthorized data and document exfiltration.

IoT - Internet of Things
Blog | Expert's view · 12. July 2022
Security challenge Zero Trust (ZT) is predicated on having the proper access and users to complete multifactor authentication. How do you know that someone is the person they say they are? With the exponential growth of home-based work, boosted even further by the pandemic, more and more employees are now hired remotely, with all interviews and hiring processes conducted online using video conferencing and email. So far so good, but this does represent a potential risk of hiring a person who is...

Show more