Category Archives: Security Risk Assessment

Mitigating Third- Party Vendor Security Risks

According to Forbes, the cost of ransomware attacks against organizations has increased by 300% in 2021. Additionally, supply chain and vendor issues have gained attention since SolarWinds, Kaseya, and other providers that have been compromised this year. Cyberpion found that three- fourths of Fortune 500 companies’ IT infrastructure exists outside of their organization. Third- party […]

read more »

The Fortinet VPN Account Leak

87,000 unpatched Fortinet SSL- VPN credentials from around 500,000 accounts have been leaked on the dark web. According to Threatpost, the attackers exploited a path transversal vulnerability in Fortinet’s FortiOS. This weakness allows attackers to perform data exfiltration, install malware, and launch ransomware. The data leak occurred between May 2019 and June 2021. CPO Magazine […]

read more »

Cybersecurity in the Age of the Coronavirus: The Impact on Business Operations

As the global workforce shifts to remote work, business operations and management face a number of obstacles. As mentioned in the previous article, the line between our work lives and our personal lives are blended now more than ever. Pre- pandemic predicted cybercrime will cost companies $6 trillion globally. According to research, last year, governments […]

read more »

The Importance of IT Security Policies

IT security policies are necessary in organizations as they define who has responsibility of what information within the company. Policies are the baseline of all procedures and should be maintained regularly. Why Do Organizations Need Security Policies? IT security policies outline rules for user and IT personnel behavior. These policies also identify consequences for not […]

read more »

How to Prevent Phishing Attacks Against Your Organization

What is a Phishing Attack? In recent news, several large companies including Microsoft and Facebook have been affected by phishing attacks. Phishing is a type of cybercrime that happens when an attacker poses as a legitimate company or website in order to divulge sensitive information from the victim. This can be the victim’s social security […]

read more »