Tag archive for : top threats
Tag archive for : top threats

Fileless Malware: How it Steals in Plain Sight

Fileless Malware 1

Some malware can hide in plain sight – injecting itself into RAM and active processes. This makes it almost impossible to detect with traditional antivirus.

Get an overview of “fileless malware”, how it works, and how it can takeover. You’ll also see examples of recent fileless attacks against restaurants, website visitors, and more.

Continue reading

Filled under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

5 Security Controls that Stop 85% of Cyber Attacks

security-controls-1

In network security, you have to prioritize. You could take hundreds of steps to improve your security, but which ones really matter?

See just five security controls you can use to stop about 85% of all cyber attacks – basically, most of the common attacks seen today. The controls come from the CIS 20 (formerly known as the SANS 20).

Continue reading

Filled under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

5 Network Security Best Practices from High-Attack Industries

Network-security-best-practices-1

Some of the most cunning and dangerous hackers in the world target companies in the finance and energy sectors. How do these companies prevent attacks? And what can you learn from them?

See five cybersecurity best practices from the finance and energy sectors. The tips were published by a federal task force in June 2017, and we point you to additional resources.

Continue reading

Filled under : Top threats
Author : Calyptix
Comment Number : 2 Comments
Tagged on : top threats

Medical Device Security: 3 Biggest Fears of Health IT Pros

3-medical-device-security

Medical devices have terrible security just like everything else in the Internet of Things. But while a hacked thermostat is annoying, a hacked insulin pump can kill you.

See the top three fears of health IT pros around medical device security. You’ll get examples of potentially fatal hacks and malware that can ensnares the entire network.

Continue reading

Filled under : hipaa , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : HIPAA , top threats

Social Media Threats: Facebook Malware, Twitter Phishing, and More

Social-Media-Threats-1

Social networks like Facebook and Twitter have become preferred channels for hackers. They are being used to attack small businesses, individuals, and even the Department of Defense.

Know the types of attacks to watch for in social media. See how quickly the threat is growing, and why hackers are learning to love Facebook more than email.

Continue reading

Filled under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats
Page 1 From 4