Take Control Back From 3rd Party SaaS Apps Today

Take Control Back From 3rd Party SaaS Apps Today

When a business uses a 3rd party SaaS application, they are entrusting another organization to handle some of their data and processes. There are many advantages to this: businesses receive a high value service at a lower cost to what they would pay for providing the same service internally. Using a 3rd party service also enables your business to save time and money spent developing a solution, enabling you to get started straight away. As more and more businesses use [...]

Making PCI, SOX, HIPAA, and Other Certifications Easier With PAM

Making PCI, SOX, HIPAA, and Other Certifications Easier With PAM

The monitoring and protection of the powerful accounts within your IT environment is essential for the security of your organization and for meeting key certifications such as PCI, SOX, and HIPAA. PAM, or Privileged Account Management, is the process of governing these accounts. The aim of PAM is to protect your business and your customers from powerful accounts that, when held in the wrong hands, could be used to do a lot of damage. Because of the risk levels in involved [...]

Identity Theft

Identity Theft – Is Your Business Vulnerable?

Identity theft is a hugely personal crime, targeting individuals, taking their personal information, and then using it for gain. But it isn’t just individuals who are being affected: there is a serious and rising risk to businesses. Successfully targeting a business is often no harder than targeting an individual, but the rewards that come with a successful ID theft can be far greater. Criminals frequently target businesses for several key reasons: Businesses have more money in their bank accounts. When opening a [...]

Has your email been hacked? Here’s what to do next

Has your email been hacked? Here’s what to do next!

We’ve all received them: the slightly suspicious looking emails, purportedly from a close friend or family member, which encourage us to click on a strange link inside. These emails, somewhat irritating and often poorly spelled, are the symptom of a much larger problem: hackers are getting more and more adept at gaining access to our email accounts. If your friends and colleagues are getting these emails from your account, then you have been hacked. Someone, somewhere in the world, has [...]

5 Ways to Increase Security Among Non-Technical Staff

5 Ways to Increase Security Among Non-Technical Staff

With security threats on the rise, the last thing you need is for your own staff to be unintentionally damaging your business. However, without proper training, that’s exactly what is happening; insider threats are costing businesses billions, and many of the issues stem from accidental rather than malicious actions. These accidental, but damaging, actions can include: Failing to install vital updates to security and anti-virus software, leading to weak security and the potential for one or many machines to be compromised. Using [...]

How do passwords work?

How Do Passwords Work?

If you've been using the internet for any length of time, you've probably accessed tens or even hundreds of websites that require a password. In most places online, a login and password is almost mandatory, regardless of whether you want to post in a forum or buy an item. Some sites even require you to create a username and password just to read their content. But what is going on when you create a password – and how does this [...]

Is Your Organization at Risk from Insider Threats?

The stark reality of IT security today is that insider threats, from members of your organization, are just as potent a threat as those from outside. We don't like to consider the fact that our employees may be maliciously using business data for their own ends, but ignoring this fact leaves your business vulnerable. According to recent research[i], 62% of security professionals saw the amount of insider attacks they experience increase over the last year. The average frequency of these [...]

6 Tips for Securing Your WordPress Website Today

6 Tips for Securing Your WordPress Website Today

WordPress is a powerful, easy to use, content management system used by millions of business to create almost any website you can dream up. The developer-friendly nature of the system makes it ideal for a website for anything from a one-man start-up to a large multi-national, and the simple layout and menus in the CMS make it easy for non-technical staff to update and use. Unfortunately, the popularity and usability of the platform is also one of its biggest weaknesses. Hackers [...]