Blog | Endpoint Protection
Context Data is the new gold and must be protected from any unauthorized access. Cybersecurity attacks and data breaches are unfortunately happening every single day, and no organization, no matter its size or area of business, is safe from it. Most organizations are exponentially using cloud-based solutions, such as Software-as-a-Service (SaaS), to run applications and use online services like email or instant messaging without having to deal with the cost of maintaining them.
What Happened? Last month, the former Chief Information Security Officer (CISO) of a prominent ride-hailing and food delivery organization was found guilty by a federal jury of an attempt to cover up a cybersecurity attack faced by the organization a couple of years ago. What’s different here from previous similar legal cases is that for the first time a guilty verdict makes the person (in this case the CISO) personally liable, not for the security breach itself, but for attempting to cover...
This week we highlight Microsoft Teams vulnerabilities and advise how you can protect and secure your infrastructure. Click to learn more.
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...
What Happened? Recently, a prominent ride-hailing and food delivery company suffered a major cybersecurity attack; the hacker(s) managed to penetrate the organization’s internal network and gain access to their back-end systems, including the ones storing private and sensitive customer data. Data exfiltration was neither confirmed nor denied, but several internal services, including internal communications seem to have been disrupted, rendering them temporarily unavailable or unusable,...
In previous blogs posts, we talked about the growing need for organizations to strengthen their security posture by way of a cybersecurity strategy. This strategy should keep their data secured, comply with evolving regulations, and respect user privacy at the same time. We also presented different products and solutions to address such security challenges from different perspectives. This week, we want to present you with an option to address all these challenges from a simple yet efficient...
Sharing screens during presentations can lead to a full range of dangers, from embarrassing mistakes to catastrophic slips. We’ve all been there: working on a thousand documents at the same time, and, unpromptedly, a virtual meeting requires you to screen share, and while you try to close every window, you realize every little embarrassing detail which is on full display for everyone else to see.
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations.
According to the 2021 Insider Threat Report by Cybersecurity Insiders, 98% of all organizations are vulnerable to insider threats. It is believed that in recent years insider threats are responsible for around 60% of all compromised systems and data lost.
In a previous article, we covered Mobile Threat Defense (MTD) solutions, offering threat detection, prevention, and response on mobile devices. Today we will cover similar functions but in more traditional desktop devices like workstations, laptops, and servers. Although the goal is similar, due to its own idiosyncrasies, the response is delivered in a different manner, with two different solutions providing a combined response: Endpoint Protection Platform (EPP) and Endpoint detection and...