How To Meet Backup Requirements for Cyber Insurance Coverage
How To Meet Backup Requirements for Cyber Insurance Coverage Introduction One of the most important – and often overlooked – aspects of securing cyber insurance coverage is ensuring that your backup and recovery processes meet the requirements set forth by your insurer. While most insurers are willing to work with policyholders to tailor coverage to […]
Are AWS Services More Secure?
Are AWS Services More Secure? Are AWS Services really more secure? The truth is that whenever you are involving third-party infrastructure in your security systems, you are always opening yourself up to more risks. Whenever you add more technology to your stack, it is important to factor in compliance standards, and verify that the vendors […]
7 Security Awareness Tips
In this article, we will give you a few tips on how you can stay safe from cyber attacks. Follow A Clean Desk Policy Following a clean desk policy will help reduce the risk of information theft, fraud, or a security breach caused by sensitive information being left in plain view. When leaving your desk, […]
How to Use Gophish Phishing Simulations to Teach Your Employees to Identify Phishing Emails
Deploy GoPhish Phishing Platform on Ubuntu 18.04 into AWS Phishing emails are a major security threat to businesses of all sizes. In fact, they are the number one way that hackers gain access to company networks. That’s why it is so important for employees to be able to identify phishing emails when they see them. […]
Debunking Common Cybersecurity Myths
Debunking Common Cybersecurity Myths Table of Contents Article Introduction There are many misconceptions about cyber security at home and at the workplace. Some people think they just have to install antivirus software on their computers to protect them from hackers. Having Antivirus software is a good thing but it cannot guarantee you from getting hacked. […]
What is Fuzzing?
What is Fuzzing? Intro: What is Fuzzing? In 2014, Chinese hackers hacked into Community Health Systems, a for-profit US hospital chain, and stole 4.5 million patients’ data. The hackers exploited a bug called Heartbleed that was discovered in the OpenSSL cryptography library some months before the hack. Heartbleed is an example of a class of […]