Articles

Threat Mapping: Connecting Daily Work To Cyber Risks

A survey reveals IT personnel are unable to effectively "threat map", which leaves them vulnerable. We comment on how linking routine tasks to specific cyber risks (threat mapping) empowers employees to recognize danger and help limit loss.

Read More
Stopping Ex-Employees From Logging In: A Practical Playbook For Employers

A survey reveals ex-employees are still using passwords. We comment on concrete measures such as MFA, access reviews, and verification testing, which can help prevent past employees from silently retaining or regaining access to company systems.

Read More
Why Online Criminals Target Business Tools And Productivity Apps

We comment on why online criminals increasingly concentrate their efforts on business tools and productivity applications.

Read More
The Malware Chameleon: The Growing Threat Of Polymorphic Malware

Polymorphic malware is challenging data security experts and law enforcement. What is it and why does it pose a threat?

Read More

Latest

Threat Mapping: Connecting Daily Work To Cyber Risks

A survey reveals IT personnel are unable to effectively "threat map", which leaves them vulnerable. We comment on how linking routine tasks to specific cyber risks (threat mapping) empowers employees to recognize danger and help limit loss.

Read More
Discovering False Invoices Before The Money Walks

A former health commission CEO pled guilty to wire fraud. We comment on practical ways to spot forged or altered financial documents so losses are stopped before they are drained from your organization.

Read More
Is Calling A Coworker A "German Nazi" Hate Speech? You Make The Call

A former German executive engineer files a lawsuit after being referred to as a "German Nazi". Is that hate speech? You make the call and join the conversation.

Read More
Recognizing The Red Flags Of Fake Or Inflated Employee Expenses

A former employee is convicted of embezzlement, including filing fake reimbursement requests. We comment on recurrent clues in receipts, behavior, and spending patterns that suggest an employee may be submitting fake requests.

Read More
For Younger Workers, Is Working For "Meaningful Work" More Important Than Pay? You Make The Call

A survey claims that younger employees want "meaningful work" more than they do pay. Do you agree with that? You make the call and join the conversation.

Read More