Articles

Exorcising PLAYFULGHOST: How To Defend Your Network Against The Latest Stealthy VPN Malware

Learn the origin and evolution of the PLAYFULGHOST malware and practical steps to protect your devices and organization from this advanced cyber threat.

Read More
Gaming Engine Malware: How Employers Can Block The Next Wave Of Cyber Attacks

We review a new malware risk and how employers can guard against cross-platform malware campaigns that exploit open-source game engines.

Read More
Are Former Employees Your Greatest Cybersecurity Threat?

We examine how former employees can compromise online assets, and we share real-world examples of insider cyber risks, along with steps organizations can take to help prevent digital loss.

Read More
Inside The Rising Tide Of Spear Phishing: Why Targeted Attacks Are Becoming More Dangerous Than Ever

We examine spear phishing, recent stats and high-profile cases, and why these evolving targeted attacks threaten individuals and organizations.

Read More

Latest

Exorcising PLAYFULGHOST: How To Defend Your Network Against The Latest Stealthy VPN Malware

Learn the origin and evolution of the PLAYFULGHOST malware and practical steps to protect your devices and organization from this advanced cyber threat.

Read More
Ask Jack: Why Do I Feel Guilty If I Take My Vacation During The Holidays?

Jack discusses employer vacation policies and some challenges.

Read More
Accommodation Without Litigation: Practical Guidance For Managers And The PWFA

We explore how managers and supervisors can respond to accommodation requests under the Pregnant Workers Fairness Act.

Read More
Building Trust: How Internal Controls And Audits Help Safeguard Public Funds

We review the important role of regular internal audits and segregation of duties in maintaining transparency and accountability within organizations.

Read More
Gaming Engine Malware: How Employers Can Block The Next Wave Of Cyber Attacks

We review a new malware risk and how employers can guard against cross-platform malware campaigns that exploit open-source game engines.

Read More