vulnerabilities

The Importance of Security in Mergers & Acquisitions

Mergers and Acquisitions- big things happening in the world of business. M&As have yielded wonderful results and have even resulted in the genesis of some of the most successful of business firms. Well, let’s look at another aspect of the M&A process. Typically seen as a mere boardroom thing, there are other aspects of M&A

[ Read More ]

Is Your Router Being Exploited By Cyber Attackers?

Chances are you have a wifi router in your home that broadcasts an internet signal so your devices, laptops, smartphones, tablets, video game consoles, and whatever else can use it. If you work in an office, chances are you have a router there too. And if you go to your local coffee shop to surf

[ Read More ]

Is The Department Of Labor Exposing Your Employee Benefits To Attack?

In the U.S. and Canada, the first Monday of September is dedicated to Labor Day, a public holiday established to honor the social and economic achievements of hard working Americans throughout history. According to the U.S. Department of Labor (DOL), the event recognizes how the average employee has directly contributed to the current strength and prosperity

[ Read More ]

These Software Vulnerabilities Have Pentesters On Edge

A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any

[ Read More ]

Don’t Forget These 4 Tips To Stop A Ransomware Infection In Its Tracks

Fourteen months after WannaCry has been introduced to the world, we continue to hear new stories of companies falling for its derivatives and seems like there is no end to the scourge. One way or another firms realize that the installation of an antivirus software is no longer sufficient. Employees make or break the corporate

[ Read More ]

Here’s Why CIOs Worry More About Ransomware Than Inside Jobs

According to a recent study, about 72% of all Chief Information Officers (CIOs) believe corporate extortion is the number one security threat facing organizations today. This is the result of a survey conducted by Logicalis Ireland, an IT solutions firm, which covered 890 CIOs from 23 countries in the world. CIOs are very aware of

[ Read More ]

This Is How The EU Exposed Serious Vulnerabilities In Portugal’s Security

European Union (EU) inspectors have identified some serious weaknesses in the security of personal data contained in Portugal’s Schengen Information System (SIS), placing the bureau in a most unfavorable position. The EU inspection team discovered vulnerabilities regarding how SIS secures its personal data database during their routine inspection. SIS is Portugal’s national police database for

[ Read More ]

Why Spending Billions Still Hasn’t Protected Web Applications

A recent study report points out that 100 percent of web applications are vulnerable to attack, despite billions that companies would spend on cybersecurity efforts. Trustwave’s eleventh annual Global Security Report, released last week, says that in 2018 companies would be spending an estimated $96 billion on cybersecurity efforts, but 100 percent of web applications

[ Read More ]

Cyber Security 101: Assurance Against Technology Threats

Digital assaults hit the headlines consistently and they are not just a risk to large companies, governments, and banks but also to small businesses and individuals. Cyber attacks have existed since the beginning of the Web, however, they’ve turned out to be more complex and far-reaching after some time. It is now more organized and

[ Read More ]

How Severe Are The Vulnerabilities In Most Web Applications?

The Automated Code Analysis: Web Application Vulnerabilities in 2017 revealed that 94% of web applications suffer from high-severity software vulnerabilities. Positive Technologies, a security firm, tested every app that has different levels of severity and found that 85% of them have an exploitable vulnerability—and it’s safe to say cybercriminals have noticed this feature as well.

[ Read More ]