Blog

Blog

DMARC: The Next Step in Email Hygiene and Security

In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers. In 1996, Sabeer Bhatia...
Blog

How to Create a Strong Password in 7 Easy Steps

On May 7th of every year, organizations worldwide remind their end users of the importance of a strong password. But with remote workforces becoming the new normal and a sharp increase in the digital information exchanged daily, strong password best practices must be top-of-mind year-round. Despite the increased public importance of data security, many...
Blog

Are Password Managers Safe to Use?

Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.  These new cyber threats led to the creation of tools...
Blog

5 Examples of Strong Passwords That Will Secure Any Account

Passwords, our digital keys, wield a quiet power today. They protect your personal and business information, making them prime targets for hackers. With this power comes responsibility and the ongoing struggle to keep our virtual lives secure. AI has also made accessing passwords easier for cyber criminals. Modern cyber criminals use AI solutions like...
Blog

Protect your loved ones from phishing, social engineering and other cyber attacks

Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering. Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog

How Security Leaders Can Use Multi-Factor Authentication to Protect Sensitive Data

As cyber criminals discover new ways to harvest login credentials, usernames and passwords have become less effective at keeping malicious users at bay. Research shows there are over 15 billion stolen login credentials on the dark web, which criminals routinely use to steal sensitive information from modern organizations. With such a high volume of data breaches and credential theft, the need to...
Blog

How Secure is Cloud Storage? Here are the Important Risks to Know

The rise of cloud storage has enabled much of the rapid digital transformation people have experienced since the onset of the pandemic. Forecasts project that today’s $83.41 billion global market will explode to $376.37 billion by 2029. While cloud storage opens many opportunities to streamline processes and productivity, let’s keep in mind the arduous risks it poses. Skyhigh Security found that...
Blog

11 Cyber Security Tips for the Holidays

E-commerce growth is expected to grow by 9.4% by 2024; by 2027, it’s forecasted to hit a whopping $8 trillion for the first time. More people shopping online means more opportunities for cyber criminals to strike. In fact, there’s a growing trend of cyber scams taking place during the holiday shopping spree. As we all get busy with our holiday shopping and preparations, keeping security in mind...
Blog

What Organizations Can Learn from the Toyota Cloud Breach

Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever. According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries. The auto industry has recently integrated cloud storage at all levels of their...
Blog

5 Examples of Spear Phishing Attacks

When it comes to cyber crime, hackers like to locate the most high-value targets, whether it’s a piece of infrastructure or an individual with access to privileged information, all while expending the least effort possible. In most examples of spear phishing attacks, a criminal will send out targeted attacks via email to multiple users. In these emails, the attacker will use high-pressure...

Spear Phishing vs. Phishing: Everything You Need to Know

Spear phishing occurs when cyber criminals deploy targeted attacks against individuals and businesses alike via email. Using savvy tactics, hackers collect sensitive data about specific parties to construct messages that sound familiar and trustworthy. As its name implies, spear phishing falls under the larger umbrella category of phishing attacks that victimize end users and organizations daily....
Blog

Password Safety - Empower Your Workforce To Protect Sensitive Data

Make Your Passwords Secure Again! In connection with the most recent security breaches, let's take a few minutes to highlight the importance of talking with your employees about password safety. Cyber criminals strive to infiltrate our networks and weak passwords are a way in. Empowering your employees with cyber security awareness training is an excellent way to teach best practices for...
Blog

Impending breach notification laws highlight importance of security awareness

New data breach notification proposals from President Obama and other political leaders will only exacerbate the impact of these incidents. The stakes surrounding cybersecurity aren’t just increasing – they are expanding. For years now, business leaders have understood that data breaches are a serious issue, one which firms must do everything in their power to avoid. After all, these incidents...
Blog

Supplementary guide to achieving PCI-DSS compliance cloud computing

Cloud computing services require special attention in regards to information security and privacy. This is especially important when using credit card data while cloud computing in order to meet PCI-DSS ("Payment Card Industry – Data Security Standard") standards. To this end, the SSC ("Standard Security Council") published a document entitled “Information Supplement: PCI DSS Cloud Computing...