Cyber Security Awareness and Vulnerabilities Blog

cs-manage-identities-non-employees-blog-700x350.jpg

How to Manage Identities for Contractors, Consultants, and Other Non-Employees

For years, organizations have recognized the need to pay close attention to and manage the access that their employees have with the help of identity governance and administration solutions.  More recently, organizations are also being faced with the reality that they need to…

Read More

Recently, Sophos announced that as of January 2020, management of their antivirus solution for UNIX via their centralized management console would no longer be supported. In reaction to this decision, we would like to take the time to reaffirm our commitment to maintaining support for UNIX…

Read More

red-blue-purple-teams-best-practices-blog-header11.jpg

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly when it comes to technology, is by putting it through a stress test. Naturally, this same principle is…

Read More

cs-reduce-help-desk-cost-blogresize.png

IT teams handle a great number of tasks that enable an organization to run smoothly. These include handling questions related to technical support for the company’s computer systems, software, and hardware, in addition to performing regular system updates and meeting periodic training needs.…

Read More

ptx-blog-diversionary-tactics-ransomware-misdirection-1920x744.jpg

Companies today are seeing a disturbing trend when it comes to the most common attacks they are facing. Ransomware is on the rise and no OS is immune. In fact, most reports show that malware on Linux has tripled since 2015. According to the 2019 Malware…

Read More

We’ve compiled a list of the top 15 things every customer should know about Core Impact. Take a look and see what you may have been missing.

Read More

cs-what-is-rubber-stamping-resize.png

Bulk approvals of requests to have access to any of the various systems and assets quickly becomes a security concern. In order to avoid giving into the temptation to rush approvals of these requests without adequate review, organizations must first understand the damage that can result from overusing approvals, why it happens, and how this can be prevented.

Read More

cs-dark-web-blog-resize 2.jpg

Even as its top marketplace, Dream Market, prepares to close its doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, has recently reopened. And what are some of the most common wares…

Read More

Why you need IGA2.png

Demands on organizations continue to intensify – the precarious balance of requests for more access with the need to be more secure is difficult to maintain. Additionally, all of this is to be achieved faster, with fewer resources. It is more important than…

Read More

five-malicious-insider-threat-indicators-and-how-mitigate-risk-blog.png

With the prevalence of cyber attacks from individuals and groups looking to exploit corporate vulnerabilities and sensitive information assets, companies sometimes overlook another common threat: their own employees. It’s incredibly disheartening to think of trusted current or former colleagues looking to exploit sensitive…

Read More