Articles

From Opportunistic Malware To Industrialized Extortion: The Rise Of Ransomware As A Service

The DOJ announces charges against an international cybercriminal. We examine industrialized ransomware as a service and its loss exposure for all organizations.

Read More
Toxic Searches: Stopping Malware Masquerading As Legit Apps

Online criminals are leveraging Google search results to deliver malware. We examine how fake sites abuse "top results," the risks, and practical loss prevention steps.

Read More
Guarding Against Insider Sabotage: Practical Strategies For Employers

We explain how employers can reduce the risk of internal sabotage by privileged staff and respond quickly when they suspect an employee has intentionally damaged systems or data.

Read More
Securing Employee Healthcare Data: The Growing Cyber Risk

We explore how healthcare data increases risk, including legal, regulatory, and financial liabilities for organizations.

Read More

Latest

From Opportunistic Malware To Industrialized Extortion: The Rise Of Ransomware As A Service

The DOJ announces charges against an international cybercriminal. We examine industrialized ransomware as a service and its loss exposure for all organizations.

Read More
Limiting Signature Authority To Reduce High-Stakes Embezzlement Risk

A trusted bookkeeper with signature authority steals nearly $10M. We explore the reason given for the theft and how unchecked signature authority places organizations at high risk.

Read More
Spear Phishing: Why Online Criminals Are Turning To Old Tactics For New High-Target Victims

Ransomware activity declined, but new tactics using old methods are emerging. We examine spear phishing and why online criminals are turning back to it for success.

Read More
Are Employees Undervalued? You Make The Call

A UK survey claims that employees feel undervalued. What do you think?

Read More
Toxic Searches: Stopping Malware Masquerading As Legit Apps

Online criminals are leveraging Google search results to deliver malware. We examine how fake sites abuse "top results," the risks, and practical loss prevention steps.

Read More