The Verizon DBIR is one of the most respected cyber security reports published each year – but can you trust the data?
See errors we found in the new 2018 edition of the DBIR. Decide for yourself if the report is trustworthy.Continue reading
One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.
See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.Continue reading
Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.
See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.Continue reading
Virtual private networks are a great tool to use when building your business’s network security plan. So what options do you have?
The two most common VPN types are SSL VPN and IPsec VPN. Read on to see how they measure up to your company’s needs.Continue reading
Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.
See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.Continue reading
Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.
See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.Continue reading
There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.
See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.Continue reading
Wait, there's more! Check out the second half of our predictions for cyber security trends in 2016.
See what we expect will happen in healthcare, regulation, DDoS attacks, and more.Continue reading
2016 is here and we have a full year of cyber security news and trends ahead of us.
But what happened last year? And what does it mean for 2016? Read on to find out.Continue reading