cyber attack
Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices
2 min read
This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in...
Why cybersecurity in the workplace is everyone’s business
1 min read
“If Microsoft calls and asks you for your password…it’s not real, ” said Steve LeBlond, VP of Technology and CTO of Ochsner Health System, while speaking at our Digital Health Summit on October 3. “We [Information Technology] will never ask you to log us in.” Steve was talking about phishing attacks, one of the biggest […]
How to Prevent the Bank Robbery No One Can See
2 min read
“This is a stickup! Give me all your bitcoins!” If Butch and Sundance were alive today, they would ride into banks invisibly on malware to digitally deliver their demands.
When combining exploits for added effect goes wrong
1 min read
Since public disclosure in April 2017, CVE-2017-0199 has been frequently used within malicious Office documents. The vulnerability allows attackers to include Ole2Link objects within RTF documents to launch remote code when HTA applications are opened and parsed by Microsoft Word. In this recent campaign, attackers combined CVE-2017-0199 exploitation with an earlier exploit, CVE-2012-0158, possibly in […]
Cisco Leading Cyber Training Effort to Help Employ Virginia Veterans
3 min read
The Virginia Veterans Cyber Training (VVCT), pioneered by Cisco, is a free accelerated online program offering cyber training from Cisco, Amazon Web Services, (ISC)2, Palo Alto Networks, and Fortinet.
Ransomware Attackers Strike Again
1 min read
After last month’s WannaCry cyberattack, a new ransomware attack shut down systems across Europe this week. Get the latest on the attack and steps you can take to strengthen your security.
Top 5 Security Threats for Retailers in the Digital Age
3 min read
As more information goes online, it is more vulnerable to certain types of threats. The challenge is to align networks, systems, and company cultures to support secure practices in this new arena.
Go Digital Securely … and Fast
2 min read
Would you trust your money to a bank if it had no vaults and no guards? Of course you do. You do it every day.
Attackers Evolve Tactics to Infiltrate Your Network via Email
3 min read
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]
1