Our Blog

RSS

WannaCry may be the latest outbreak or ransomware to hit the news, but it is not the 1st or the last. In 2016 alone, it is estimated that $1 billion dollars in cyber ransoms were paid out to cyber criminals. If this widespread attack…

Read More

According to the Anti-Phishing Work Group, 1.2 million individual phishing attacks took place in 2016 – a 65% increase from the year before. These attacks have been mentioned across all industries and the most recent Verizon Wireless Data Breach Report states that 95%…

Read More

Did you know that one of the top nine attack types consistently covered in Verizon’s Data Breach Report are insider threats and privileged misuse? According to this year’s report, 66% of insiders steal information in hopes of selling it for cash, 17% are…

Read More

It seems as if government agencies, both locally and nationally, are making headlines for mostly the wrong reasons these days. From scandals to breaches and cybersecurity this has become such a sensitive subject within the past year that these events have left most…

Read More

It’s amazing how much cyber-security has grown over the past few years. Where we were once worried about keystroke logging or Trojan horse attacks, we now face situations like ransomware and cyber warfare. User credentials are still the number one target for bad…

Read More

Retail is arguably the leader in terms of the most financial transactions executed in an industry. With that in mind, the retail industry also makes up 8% of all data breaches. It may feel nerve-racking to both work and participate in such a…

Read More

Getting access is more and more complicated with increased users, devices and applications. See how Core Access Insight can help simplify your access risk by giving you visibility to the access relationships in your organization. 

Read More

Don’t for a minute think that bad actors have no interest in the information you collect in your state or local office. Whether you work for the City Water Department or the Department of Tax and Revenue for your county, you are collecting…

Read More

Identity and Access Management was born out of enabling the business. We discovered that as technology systems began to proliferate throughout our companies, we needed a way to quickly and efficiently give people access to the devices and applications they needed to do…

Read More

  After looking at this, are you ready to get started with Core Impact? For more information on Core Impact – including our new pricing promotions – join our live webinar on April 26, 2017 at 11 AM EST. Can't make the webinar? Talk to…

Read More