Latest Insights

Blog

Emergent Threat Notification - Pass The Cookie

Pass-the-cookie attacks can occur at any time granting access and bypassing MFA altogether.
Emergent Threat Notification - Pass The Cookie
Blog

Time’s Up On TikTok In Corporate Environments

Several governments worldwide have or are considering banning the Chinese-owned social media app TikTok from government mobile devices as it presents an “unacceptable level of risk to privacy and security.” This begs the big question: Is the TikTok app ‘really’ dangerous to businesses?
Time’s Up On TikTok In Corporate Environments
Blog

Hygiene Tip: Shut Down Attackers Harvesting Cached Browser Credentials

The ActZero Threat Intelligence Team learned that ransomware actors harvest credentials from browsers during attacks. Distinguished Security Engineer, Sean Hittel, provides insights into their techniques.
Hygiene Tip: Shut Down Attackers Harvesting Cached Browser Credentials
Blog

Don’t Let Microsoft OneNote Documents Become Your One Recurring Nightmare

OneNote is highly popular among businesses as it provides a simple-to-deploy, open-source note-taking application supported by various platforms and devices. It offers an easy-to-use solution for users who need to capture and store ideas, notes, and other information quickly and easily. Unfortunately, it also comes with a host of challenges. Learn more.
Don’t Let Microsoft OneNote Documents Become Your One Recurring Nightmare
Blog

How to Better Protect Your IT Supply Chain From Cyber Attack

Taking proper steps to secure the enterprise’s IT supply chain is crucial to maintaining an effective cybersecurity program. Here’s what it takes to start moving toward that state.
How to Better Protect Your IT Supply Chain From Cyber Attack
Blog

Ransomware Readiness Goes Beyond Back-ups and Payments

Here are a few simple things businesses can do to reduce their cyber risk and become a formidable opponent against ransomware actors.
Ransomware Readiness Goes Beyond Back-ups and Payments
Blog

Cybersecurity Best Practices

Implementing cybersecurity best practices can significantly reduce critical risks, such as disruption of business operations, exfiltration of sensitive data, and reputational damage. Consider these best practices when developing your strategy and implementation plan as a guide to cybersecurity.
Cybersecurity Best Practices
Blog

Why Cybersecurity Is Important in Healthcare

Ransomware attacks nearly doubled in healthcare between 2020 and 2021. Hackers continuously look for new ways to attack and steal patient data, costing organizations money and their reputation. Read about cybersecurity challenges specific to healthcare organizations and how to remediate them using our free resources.
Why Cybersecurity Is Important in Healthcare
Blog

Top 5 Data Breaches and How to Prevent Them

Companies large and small need to talk about the threat posed by data breaches. We look at the five most common attack types and steps to mitigate the risk.
Top 5 Data Breaches and How to Prevent Them
Blog

How Not to Pay a Ransom (Twice)

Adam Mansour reiterates the pitfalls of succumbing to the demands of ransomware hackers, cites external authorities on the matter, and offers analogies to hit the point home.
How Not to Pay a Ransom (Twice)
Blog

Don't Pay the Ransom. Period

We highlight the tangible impact on your business resulting from the consequences of paying a ransom.
Don't Pay the Ransom. Period
Blog

Ransomware Alert: Hackers Love a Long Weekend Too

Long weekends are prime time for cyberattacks. Keep hackers out with these safeguards.
Ransomware Alert: Hackers Love a Long Weekend Too
Blog

On Ransomware: Government Strategy and Secret Service Tactics

A candid discussion brimmed with actionable insights for frontline cybersecurity leaders. Includes curated resources on how to harden your network and defense.
On Ransomware: Government Strategy and Secret Service Tactics
Blog

Can Your Financial Firm Report Breaches in 36 Hours or Less?

Adam Mansour explores new 36-hour breach notification requirements of Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers in a joint ruling from the FDIC, FRB and OCC. He offers KPIs that bank service providers can consider to assess their readiness for such requirements.
Can Your Financial Firm Report Breaches in 36 Hours or Less?
Blog

Cybersecurity in Financial Services: How to Protect Your Business From a Data Breach

This blog will cover three cybersecurity incidents, the lessons learned, and how Managed Detection & Response (MDR) can optimize your financial institution's defense capabilities.
Cybersecurity in Financial Services: How to Protect Your Business From a Data Breach
123