The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarize themselves with the threats and the agents behind them.
Cyberthreats and the finance sector
The most alarming data breaches of 2018
Factors such as increased connectivity and improved monitoring tools contribute to the record-breaking number of data breaches in 2018. However, the biggest contributor by far has to be the brazen ambition of hackers. That is, the counts aren’t getting bigger just because we’re getting better at counting breaches — the scope of cyberattacks has increased as well, with each major assault affecting hundreds of thousands to millions of users.
Lessons from a disaster recovery plan audit
The biggest challenges to network security in 2019
With the United States as the world leader in IT-driven innovations, it comes as no surprise that it also suffers the most data breach incidents. Greater connectivity means having a larger surface area to protect against network infiltrators and exfiltrators (i.e., internal actors who commit the unauthorized retrieval, transfer, or copying of data from inside a network outwards), be they malicious or unintentionally harmful in nature.
Premise-based or cloud-hosted VoIP?
Business owners are turning to the cloud because of its numerous advantages. However, others prefer premise-based infrastructures. When it comes to VoIP phone systems, which is better for your business?
Installation and maintenance
On-premises VoIP phone systems are installed in your office and typically managed and maintained by your own personnel.
Groups, Yammer, and Teams: What are they?
Fileless malware: Are you at risk?
Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage.
Tidy IT: emails, chats, and files in one app
Which social media platform is best for you?
Include VoIP phones in your recovery plan
Businesses that focus heavily on sales and customer service need a reliable, efficient, and effective telecommunications system. If their services break down even for just a day, the losses will be significant, which is why a well-crafted disaster recovery plan should include protecting the company’s Voice over Internet Protocol (VoIP) telephony system.