MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY

Does it feel like you’re getting an email update from everyone you’ve ever done business with about how their company is handling COVID-19? A spike in corporate email messages meant to keep customers informed has provided a valuable opening for bad actors to exploit as they mount new phishing attacks.  The United States Secret Service recently released an Read more about MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY[…]

Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]

Know your terminology

We constantly come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm. Here’s an overview of the most commonly used terms Read more about Know your terminology[…]

BCP tactics to keep your business running

It’s a fact of life. Events out of your control can disrupt your business operations. While you can’t necessarily control the unexpected, you can take some precautions to prevent most business disruptions. Here are some key business continuity strategies that organizations across the globe rely on to keep their doors open. Backup your data, applications Read more about BCP tactics to keep your business running[…]