Research Archives - Calyptix SecurityResearch Archives - Calyptix Security
Post filed under : Research
Post filed under : Research

Top 4 Insights from Verizon Data Breach Report 2017

verizon-dbir-2017-threat-actions

One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.

See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.

Continue reading

Filed under : Malware , Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : malware , research , top threats

DNC Hacks: How Spear Phishing Emails Were Used

Network Security Threats 1

Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.

See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.

Continue reading

Filed under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet

Phishing Attacks: 30% will open a scam email

computer-security-incident-oops

Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.

See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.

Continue reading

Filed under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet

Top 5 Sources of Security Incidents in Retail

computer-security-incident-oops

Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.

See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.

Continue reading

Filed under : pci dss , Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS , research , retail

Top 5 Risks of Cloud Computing

Everything-is-fine-office-cloud-fire

There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.

See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.

Continue reading

Filed under : Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : research

Internet Crime and Scams from FBI Annual Report

internet crime

Romance scams, business email fraud, and scams targeting the elderly, were all popular last year, according to the annual report of the FBI Internet Crime Compliant Center.

In this post, we highlight four trends shown in the FBI’s data. You’ll see that social media scams increased 400%, and who is most at risk for romance scams and business email compromises.

Continue reading

Filed under : Research
Author : Calyptix
Comment Number : No Comment Yet
12
Page 1 From 2