Search Results for: impact of a breach Blog Post Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Blog Post Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in... Blog Post The Need for Cyber Incident Response April 1, 2020 It is essential that every organization is prepared for the worst. Hence the key to handle such a situation is... Blog Post French police detain suspect who laundered €19 million in ransomware payments January 20, 2022 In recent years, the public as a whole has become well-accustomed to high-profile ransomware attacks, especially since the global WannaCry... Blog Post Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced... Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... Blog Post Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to... Blog Post Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... Blog Post Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a... Blog Post Ransomware Attack on Toronto Transit Commission December 6, 2021 On October 29, 2021, the Toronto Transit Commission (TTC) acknowledged that it became the victim of a sophisticated ransomware attack.... Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Blog Post The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace...
Blog Post Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Blog Post Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in...
Blog Post The Need for Cyber Incident Response April 1, 2020 It is essential that every organization is prepared for the worst. Hence the key to handle such a situation is...
Blog Post French police detain suspect who laundered €19 million in ransomware payments January 20, 2022 In recent years, the public as a whole has become well-accustomed to high-profile ransomware attacks, especially since the global WannaCry...
Blog Post Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced...
Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
Blog Post Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in...
Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to...
Blog Post Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown...
Blog Post Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that...
Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a...
Blog Post Ransomware Attack on Toronto Transit Commission December 6, 2021 On October 29, 2021, the Toronto Transit Commission (TTC) acknowledged that it became the victim of a sophisticated ransomware attack....
Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Blog Post The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace...