A survey reveals IT personnel are unable to effectively "threat map", which leaves them vulnerable. We comment on how linking routine tasks to specific cyber risks (threat mapping) empowers employees to recognize danger and help limit loss.
Read MoreA survey reveals ex-employees are still using passwords. We comment on concrete measures such as MFA, access reviews, and verification testing, which can help prevent past employees from silently retaining or regaining access to company systems.
Read MoreWe comment on why online criminals increasingly concentrate their efforts on business tools and productivity applications.
Read MorePolymorphic malware is challenging data security experts and law enforcement. What is it and why does it pose a threat?
Read MoreA survey reveals IT personnel are unable to effectively "threat map", which leaves them vulnerable. We comment on how linking routine tasks to specific cyber risks (threat mapping) empowers employees to recognize danger and help limit loss.
Read MoreA former health commission CEO pled guilty to wire fraud. We comment on practical ways to spot forged or altered financial documents so losses are stopped before they are drained from your organization.
Read MoreA former German executive engineer files a lawsuit after being referred to as a "German Nazi". Is that hate speech? You make the call and join the conversation.
Read MoreA former employee is convicted of embezzlement, including filing fake reimbursement requests. We comment on recurrent clues in receipts, behavior, and spending patterns that suggest an employee may be submitting fake requests.
Read MoreA survey claims that younger employees want "meaningful work" more than they do pay. Do you agree with that? You make the call and join the conversation.
Read More