Category: Security

Application Performance Monitoring: Why is it important for your organization?

May 18, 2021 Security by Chris Soh
Application Performance Monitoring (APM) refers to monitoring or managing the performance of your code, application dependencies, transaction times, & overall user experiences. It is an important technology that ensures the computer application programs are performing as expected. The ultimate goal of performance monitoring is to supply end users with a top quality end-user experience. What
Read More

How PAM can help against insider threats

May 18, 2021 Security by Chris Soh
Insider threats take many forms. Some are malicious agents looking for financial gain. Others are simply careless or unaware employees who click on suspicious links. An insider threat can be defined as someone close to an organization, with authorized access, improperly using that access to negatively impact the organization’s critical information or systems. Insider threats have the
Read More

How Network Monitoring brings better Visibility in your business

Sep 4, 2020 Security by Chris Soh
All companies need network management and network monitoring. It’s the basic building block of the company that connects all the parts within the organization. It is made up of two Cs – collaboration and communication. It’s a place where all the collected data collaborate and interlinks are established between them. All the information related to business, customers, products,
Read More

5 Shocking Data Breaches in the First Half of 2020

Sep 4, 2020 Security by Chris Soh
The number of publicly reported data breaches has dropped in the first half of 2020 and according to The Identity Theft Resource Center and the number of individuals who have been impacted by data breaches, dropped by 66% compared to 2019. However, we have witnessed some shocking data breaches over the past 6 months as
Read More

Healthcare Data Incident

Oct 25, 2019 Security by admin
In June 2019, The Methodist Hospitals, Inc. identified unusual activities within employee email accounts. They immediately started an investigation, working with third-party forensic investigators to assess the scope of the issue at hand. On August 7, 2019, the investigation revealed that two employees fell victim to a phishing email that allowed an unauthorized actor access to their
Read More

Data Leak: Travel, Hospitality, and Government

Oct 25, 2019 Security by admin
Noam Rotem and Ran Locar of vpnMentor’s research team recently discovered an unsecure and unencrypted online database. This database belongs to AutoClerk, a reservations management system. Best Western Hotels and Resort Group had just bought AutoClerk prior to this discovery. The total size of the database was over 179GB of data. Exposed data includes sensitive information, such as full
Read More

You Hack Me, I Hack You

Oct 25, 2019 Security by admin
Is it ever appropriate to hack the hacker who hacked you? That is, is it ever right to hack back in retaliation? I’ll leave that question up to you but technically it is still illegal. However, in one case a victim-turned-vigilante not only served their own justice, but also shared some love with the impacted community as
Read More

New variations of the EMOTET Trojan surface

Jun 25, 2019 Security by admin
First identified in 2014, EMOTET was a troublesome malware trojan used to steal data from banking institutions. According to researchers from Trend Micro, new variants were found spreading via spam bots this August. SC Magazine reports that the new EMOTET variants have been targeting multiple geographical regions, each able to drop a different payload and spread in
Read More

Prevent Employees From Falling For Phishing Attacks

Jun 25, 2019 Security by admin
According to the 2019 Verizon Data Breach Investigation Report, a full third of cyber attacks involve phishing tactics. While there is evidence that employee education and phishing prevention solutions are effective in stopping basic phishing attempts, attackers have responded by making phishing emails more sophisticated and convincing. Examples include targeted spear phishing messages based on victim’s
Read More