Latest Insights
Blog
Emergent Threat Notification - Pass The Cookie
Pass-the-cookie attacks can occur at any time granting access and bypassing MFA altogether.
Blog
Time’s Up On TikTok In Corporate Environments
Several governments worldwide have or are considering banning the Chinese-owned social media app TikTok from government mobile devices as it presents an “unacceptable level of risk to privacy and security.” This begs the big question: Is the TikTok app ‘really’ dangerous to businesses?
Blog
Hygiene Tip: Shut Down Attackers Harvesting Cached Browser Credentials
The ActZero Threat Intelligence Team learned that ransomware actors harvest credentials from browsers during attacks. Distinguished Security Engineer, Sean Hittel, provides insights into their techniques.
Blog
Don’t Let Microsoft OneNote Documents Become Your One Recurring Nightmare
OneNote is highly popular among businesses as it provides a simple-to-deploy, open-source note-taking application supported by various platforms and devices. It offers an easy-to-use solution for users who need to capture and store ideas, notes, and other information quickly and easily. Unfortunately, it also comes with a host of challenges. Learn more.
Blog
How to Better Protect Your IT Supply Chain From Cyber Attack
Taking proper steps to secure the enterprise’s IT supply chain is crucial to maintaining an effective cybersecurity program. Here’s what it takes to start moving toward that state.
Blog
Ransomware Readiness Goes Beyond Back-ups and Payments
Here are a few simple things businesses can do to reduce their cyber risk and become a formidable opponent against ransomware actors.
Blog
Cybersecurity Best Practices
Implementing cybersecurity best practices can significantly reduce critical risks, such as disruption of business operations, exfiltration of sensitive data, and reputational damage. Consider these best practices when developing your strategy and implementation plan as a guide to cybersecurity.
Blog
Why Cybersecurity Is Important in Healthcare
Ransomware attacks nearly doubled in healthcare between 2020 and 2021. Hackers continuously look for new ways to attack and steal patient data, costing organizations money and their reputation. Read about cybersecurity challenges specific to healthcare organizations and how to remediate them using our free resources.
Blog
Top 5 Data Breaches and How to Prevent Them
Companies large and small need to talk about the threat posed by data breaches. We look at the five most common attack types and steps to mitigate the risk.
Blog
How Not to Pay a Ransom (Twice)
Adam Mansour reiterates the pitfalls of succumbing to the demands of ransomware hackers, cites external authorities on the matter, and offers analogies to hit the point home.
Blog
Don't Pay the Ransom. Period
We highlight the tangible impact on your business resulting from the consequences of paying a ransom.
Blog
Ransomware Alert: Hackers Love a Long Weekend Too
Long weekends are prime time for cyberattacks. Keep hackers out with these safeguards.
Blog
On Ransomware: Government Strategy and Secret Service Tactics
A candid discussion brimmed with actionable insights for frontline cybersecurity leaders. Includes curated resources on how to harden your network and defense.
Blog
Can Your Financial Firm Report Breaches in 36 Hours or Less?
Adam Mansour explores new 36-hour breach notification requirements of Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers in a joint ruling from the FDIC, FRB and OCC. He offers KPIs that bank service providers can consider to assess their readiness for such requirements.
Blog
Cybersecurity in Financial Services: How to Protect Your Business From a Data Breach
This blog will cover three cybersecurity incidents, the lessons learned, and how Managed Detection & Response (MDR) can optimize your financial institution's defense capabilities.
123