Category: Security

Application Performance Monitoring: Why is it important for your organization?

May 18, 2021 Security by Chris Soh
Application Performance Monitoring (APM) refers to monitoring or managing the performance of your code, application dependencies, transaction times, & overall user experiences. It is an important technology that ensures the computer application programs are performing as expected. The ultimate goal of performance monitoring is to supply end users with a top quality end-user experience. What
Read More

How PAM can help against insider threats

May 18, 2021 Security by Chris Soh
Insider threats take many forms. Some are malicious agents looking for financial gain. Others are simply careless or unaware employees who click on suspicious links. An insider threat can be defined as someone close to an organization, with authorized access, improperly using that access to negatively impact the organization’s critical information or systems. Insider threats have the
Read More

How Network Monitoring brings better Visibility in your business

Sep 4, 2020 Security by Chris Soh
All companies need network management and network monitoring. It’s the basic building block of the company that connects all the parts within the organization. It is made up of two Cs – collaboration and communication. It’s a place where all the collected data collaborate and interlinks are established between them. All the information related to business, customers, products,
Read More

5 Shocking Data Breaches in the First Half of 2020

Sep 4, 2020 Security by Chris Soh
The number of publicly reported data breaches has dropped in the first half of 2020 and according to The Identity Theft Resource Center and the number of individuals who have been impacted by data breaches, dropped by 66% compared to 2019. However, we have witnessed some shocking data breaches over the past 6 months as
Read More

Healthcare Data Incident

Oct 25, 2019 Security by admin
In June 2019, The Methodist Hospitals, Inc. identified unusual activities within employee email accounts. They immediately started an investigation, working with third-party forensic investigators to assess the scope of the issue at hand. On August 7, 2019, the investigation revealed that two employees fell victim to a phishing email that allowed an unauthorized actor access to their
Read More

Data Leak: Travel, Hospitality, and Government

Oct 25, 2019 Security by admin
Noam Rotem and Ran Locar of vpnMentor’s research team recently discovered an unsecure and unencrypted online database. This database belongs to AutoClerk, a reservations management system. Best Western Hotels and Resort Group had just bought AutoClerk prior to this discovery. The total size of the database was over 179GB of data. Exposed data includes sensitive information, such as full
Read More

Prevent Employees From Falling For Phishing Attacks

Jun 25, 2019 Security by admin
According to the 2019 Verizon Data Breach Investigation Report, a full third of cyber attacks involve phishing tactics. While there is evidence that employee education and phishing prevention solutions are effective in stopping basic phishing attempts, attackers have responded by making phishing emails more sophisticated and convincing. Examples include targeted spear phishing messages based on victim’s
Read More

Firebox Gateway Antivirus Engine Upgrade

Jun 25, 2019 Security by admin
This notice impacts Fireware v12.1 and earlier. Fireware versions 12.1.1 and later are not affected. This year, WatchGuard will upgrade the engine used to power the Gateway AntiVirus (GAV) service. To continue to use Gateway AV, you must upgrade your Firebox to the latest version of Fireware (or a minimum of Fireware v12.1.1). WatchGuard recommends you
Read More

The Top Cyber Threats Businesses Face Today

Jan 8, 2019 Security by admin
As 2018 comes to a close and we look ahead toward the new year, now is the time for reflection and planning. And for businesses of all sizes and industries, cyber security should be a major topic of discussion through this process. When it comes to information security, there isn’t a company out there that
Read More