Principle of Least Privilege

7 Apr 18
In a nutshell, the Principle of Least Privilege means limiting access to whom and for what is necessary to perform one’s duties. The concept of restricting access to data, information, applications, ...

Hidden URLs, Hidden Agendas

5 Nov 17
Two words, URL Shorteners. We’ve all seen them and probably used them ourselves, mainly because of character limitations with postings in online services like twitter, but also just to hide a ...

No Ransom, No Cry

16 May 17
The recent WannaCry (WannaCrypt) malware attack further shows how many organizations are still unprepared to prevent, respond and recover from such attacks.  This malware and a lot of other viruses typically take advantage ...

Protecting Your Organization’s Reputation – Part 3

9 Nov 16
Welcome to Part 3, of the multi-part series on “Protecting Your Organization’s Reputation”, where we’ll be focusing on the area of Data Loss and Leakage Prevention. As discussed in the previous ...

Protecting Your Organization’s Reputation – Part 2

28 Sep 16
We’ve all heard of the increases in e-mail phishing/scamming/spoofing. Typical phishing or spear phishing scams usually include a malicious URL or attachment, that attempts to install malware or to gather more ...

Protecting Your Organization’s Reputation – Part 1

7 Aug 16
Organizations can get a bad reputation from a variety of externally initiated and/or internally created issues, such as: poor customer service, spamming/spoofing, CEO/CFO spear phishing scams, leakage of customer personal/financial/health information, ...