<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: network-security

Are your Network Communications ITAR and OFAC Compliant?

Many organizations are subject to government regulations such as ITAR or OFAC that prohibit any dealings with certain foreign nations. Others have countries that they will not do business with for reasons of corporate policy - because of rampant piracy or fraud for example. However with the Internet, what matters isn't always where another computer is located, at least not from the domain name it reports or the place a user fills in as its contact address. This means that, wittingly or unwittingly, devices in any organization may be connecting with other machines in locations that they are legally forbidden to have any communication with.

Read More

Share this:

6 Cybersecurity Mistakes Every Organization Should Avoid

 

All it takes is one mistake, one wrong click or weak password, one unpatched vulnerability, for a malicious threat actor to infiltrate your network. Once they are inside, the options are endless. Security can never be 100% airtight, but making sure you have strong armor at the frontline will critically minimize the attacks that have a chance of penetrating your network. How is this defense built? Most of the time, our mind jumps right to the tools – which technologies can we use to armor up? But effective security is much more than that – setting in place the right mindset, personnel, processes AND tools is the key to keeping your data secure. In this blog post, we will share critical mistakes that managers, IT teams and employees alike should be aware of in order to make the right choices and keep the company network safe.

Read More

Share this:

UPGRADE YOUR SECURITY WITHOUT BREAKING THE BANK

Small-medium businesses are on the bullseye for cyber attacks, with businesses being attacked and compromised on an hourly basis, yet many SMBs don’t seem to be worried at all. 63% of small-medium businesses experienced a data breach in 2019, as reported in a study by Keeper Security and the Ponemon Institute. Yet the same study found that 60% of SMB owners think their businesses aren’t a likely target for a cyber attack. These numbers don’t add up, and something about these business owners’ laid back attitude just doesn’t make sense – SMB recovery from a cyber attack is estimated to cost around $200,000, and can easily reach millions depending on the extent of the damage (and in case of ransomware – how big the ransom price is). In fact, a study by BullGuard found that over forty percent of SMBs do not have cybersecurity defense plans whatsoever.

Read More

Share this:

Analysis: New Android Malware Steals Victim Data From 300+ Apps

 

A new android malware strain was uncovered in May, boasting the ability to steal data from 337 applications, including passwords and credit card information. Among these apps are some of the most highly-used applications on any android phone, such as Netflix, Gmail, Amazon, Uber, and more.

Read More

Share this:

LIVE WEBCAST: The Basics to Understanding the Secret Life of DNS – Protecting Against Modern Threats at Scale

DNS is one of the single biggest important components to making the global internet work and it is often the most neglected aspects of a network. Invented in the 80's, DNS “just works," but its ease of use has people overlooking the power of using it to protect their customers. DNS offers the first clues to what is going on in your network and is used by criminals to steal data.

Read More

Share this:

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter