Security

What is the Difference Between a Security Breach and a Data Breach?

What is the Difference Between a Security Breach and a Data Breach?

  • By Rafiq Masri
  • January 20, 2023
  • Security

In our blog, we talk about security and data breaches all the time. We tell you how you can take efforts to avoid them and how to prepare your organization for the inevitability of being exposed to them. With all that security talk, we should briefly describe the difference between a security breach and a data breach, because they are...

Read More
What Twitter’s API Breaches Mean for Cybersecurity Trends

What Twitter’s API Breaches Mean for Cybersecurity Trends

  • By Rafiq Masri
  • January 16, 2023
  • Security

Back in December of 2021, an API vulnerability impacting Twitter was disclosed. Just a few months later, in July, data from more than 5.4 million users—obtained through this vulnerability—was put up for sale, and more recently, another hacker shared the data online. Let’s take the opportunity to examine the concept of an API attack, and what can and should be...

Read More
The Vatican Proves that No One is Immune to Cyberattacks

The Vatican Proves that No One is Immune to Cyberattacks

  • By Rafiq Masri
  • December 28, 2022
  • Security

While it may not be the first target one might think of when it comes to cyberattacks, a recent Distributed Denial of Service (DDoS) attack on the Vatican’s official website only proves that cyberattacks can potentially influence any organization. Let’s consider the situation, as well as what lessons we can all take away from it. (more…)

Read More
What Exactly is a Zero-Day Exploit?

What Exactly is a Zero-Day Exploit?

  • By Rafiq Masri
  • December 23, 2022
  • Security

There are countless known threats out there that create security headaches for network administrators, but it’s not the known flaws that are the most dangerous; it’s the unknown ones that have even more potential to derail operations, expose sensitive data in security breaches, and end businesses entirely. These zero-day flaws or exploits are extremely important to keep informed about. (more…)

Read More
Mobile Malware is a Guaranteed Bad Time

Mobile Malware is a Guaranteed Bad Time

  • By Rafiq Masri
  • December 9, 2022
  • Security

More often than not, the malware you encounter will target a desktop computer. Despite this, there are indeed some threats that target mobile devices, including one which Google had to remove from the Play Store for infecting smartphones with malware and adware. We recommend that you take immediate action to uninstall these apps if you were one of the unfortunate...

Read More
Here’s Why You Are Paying So Much for Data Privacy

Here’s Why You Are Paying So Much for Data Privacy

  • By Rafiq Masri
  • November 28, 2022
  • Security

We know that security is far from a small investment, but this only serves to highlight how important it can be to your business’ continued success. You might wonder why security is such an important investment if you don’t intend to suffer a data breach, and that’s precisely the point. The cost of not investing in security far outweighs the...

Read More
Why You Shouldn’t Follow Links You Randomly Receive

Why You Shouldn’t Follow Links You Randomly Receive

  • By Rafiq Masri
  • November 11, 2022
  • Security

Paypal: Unusual activity suspended your account. For your safety confirm your identity here: [link] We’re here to tell you, very simply, not to follow links that are in messages like these, and to instead confirm their legitimacy by navigating to the website directly in a new browser. (more…)

Read More
What Counts as Personally Identifiable Information?

What Counts as Personally Identifiable Information?

  • By Rafiq Masri
  • November 7, 2022
  • Security

We frequently discuss the importance of keeping PII—personally identifiable information—secure, but what does this include? What data qualifies as PII? Here, we’re going to lock down on a definition (and you may be surprised by what this definition covers). (more…)

Read More
The Phisher—A Modern Take on The Raven

The Phisher—A Modern Take on The Raven

  • By Rafiq Masri
  • October 31, 2022
  • Security

What if Edgar Allan Poe wrote “The Raven” during the information age? (more…)

Read More
Why BEC is Such a Negative Circumstance for Any Organization

Why BEC is Such a Negative Circumstance for Any Organization

  • By Rafiq Masri
  • October 28, 2022
  • Security

It doesn’t always take a complicated malware or ransomware attack to break your business. Sometimes it’s as easy as someone sending you an email and pretending they have authority over you. Compromising a business email is one of the most common and easy hacking attacks to pull off, so you should be aware of how to put a stop to it....

Read More