Tagged: How to

  • How to Prepare for a Successful Cybersecurity Audit

    How to Prepare for a Successful Cybersecurity Audit

    The Dodd-Frank Wall Street Reform and Consumer Protection Act enacted in 2010 required the U.S. Federal Reserve to conduct annual stress tests for banks with a minimum amount of assets. C-suite leadership of these banks take these stress audits very seriously and devote ample resources and efforts to prepare for these reviews. This includes their…

  • How to Prevent Insider Threats 

    How to Prevent Insider Threats 

    In the 1999 workplace comedy classic Office Space, three disgruntled employees devise a plan: they will plant a virus in the company’s financial system, which siphons fractions of a cent from each transaction and deposits it in one of their bank accounts. Since the transactions are so small, the men are convinced that no one…

  • CYREBRO’s Fraud Analysis Sheds Light on How to Fight Against BEC and Fraud

    CYREBRO’s Fraud Analysis Sheds Light on How to Fight Against BEC and Fraud

    Fraud is nothing new and has existed well before the world wide web came into play. But with constant digital transformations and advancements in technology, it’s expected that fraud too will evolve and shift, becoming ever more dangerous and complex. Con artists continue to keep up with security trends, including digital resources, content, and organizational…

  • Common Entry Points #2 – VPN

    Common Entry Points #2 – VPN

    In our last Common Entry Points post, we discussed how ITaaS can be a major weak link, providing bad actors entry into an infrastructure. Another common but often overlooked entry point for attackers is a business’s virtual private network (VPN). Work from home and bring your own device (BYOD) policies have led to expanded attack…

  • Common Entry Points #1 – ITaaS (IT as a Service) Part 2 

    Common Entry Points #1 – ITaaS (IT as a Service) Part 2 

    Assessing the weak links in your company network is an important part of cybersecurity. The people that sit behind the computer keyboards make up some of the weakest links, as there are always a small minority of users that will click on just about anything embedded or attached in an email despite being warned about…

  • Common Entry Points #1 – ITaaS (IT as a service) Part 1

    Common Entry Points #1 – ITaaS (IT as a service) Part 1

    According to SonicWall’s 2022 Cyber Threat Report, nearly every category of cyberattack has increased in volume last year. The numbers point to an undeniable conclusion. SMB networks are under siege. In fact, let’s call it what it is. It’s a war out there. And while cyberattacks may not consist of traditional armies on the field…

Sign Up for Updates