The challenges in establishing data security best practices in a WFH environmentThe COVID-19 pandemic changed the landscape of the corporate world drastically by making WFH, mainstream.. What does that mean for your business data? How does it change your business’s cyber risk profile? Download our whitepaper, The WFH environment & associated data risks, a new perspective, to find out.
The challenges in establishing data security best practices
WFH is here to stay Are you ready?

WFH is here to stay. Are you ready?The COVID-19 pandemic brought about tremendous, unimaginable changes across the world. Lockdown, shelter-in-place orders, ban on gatherings for safety purposes and national and international travel restrictions meant the world, and businesses couldn’t function as they were doing in the pre-pandemic times.
Branding

Branding
Another less direct effect of cybercrime's attack on revenues is the impact on your brand. When a data breach or DoS occurs, a firm's brand takes a hit. There isn't any reader out there who, upon hearing the name of a particular retailer or financial firm, won't immediately recall that firm as having been the victim of a large cyber attack and data breach.
The costs of defense

The costs of defense
The most common methods that criminals use to break into our data and operations are fraudulent emails, viruses and malware, impersonization attempts, and ransomware. Whether It is done with a goal of shutting you down–such as a denial of service (DoS), pure mischief, or from the desire to access and use your data for profit, cybercrime damages your business.
The reality of cybercrime requires permanent organizational change

The reality of cybercrime requires permanent organizational change
Because cybercrime isn't going anywhere soon, every business needs to consider changes within its organization to institutionalize its emphasis on data security. This is not a problem that can be handled within a few particular operational or administrative silos.
Cybercrime: A direct assault on revenues
Cyber hygiene: The key to your business’s good cyber health
Free Internet Access? Don’t fall for this one
Online shopping? Watch out for these red flags

Online shopping? Watch out for these red flagsWho doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter if it is too hot to venture outside or if there’s a blizzard out there, you do your shopping from the comfort of your couch and the stuff at your doorstep.
DNS Cache poisoning: What every SMB must know

DNS Cache poisoning: What every SMB must knowIn one of the most common poisoning attacks, the attacker poisons the DNS Cache with the aim of leading visitors to a fake website. In a DNS cache poisoning case, the attacker gains control of the DNS server and then manipulates cache data such that anyone typing the URL of the actual website is redirected to the fake one.