
Principle of Least Privilege
In a nutshell, the Principle of Least Privilege means limiting access to whom and for what is necessary to perform one’s duties. The concept of restricting access to data, information, applications, ...

Hidden URLs, Hidden Agendas
Two words, URL Shorteners. We’ve all seen them and probably used them ourselves, mainly because of character limitations with postings in online services like twitter, but also just to hide a ...

No Ransom, No Cry
The recent WannaCry (WannaCrypt) malware attack further shows how many organizations are still unprepared to prevent, respond and recover from such attacks. This malware and a lot of other viruses typically take advantage ...

Protecting Your Organization’s Reputation – Part 3
Welcome to Part 3, of the multi-part series on “Protecting Your Organization’s Reputation”, where we’ll be focusing on the area of Data Loss and Leakage Prevention. As discussed in the previous ...

Protecting Your Organization’s Reputation – Part 2
We’ve all heard of the increases in e-mail phishing/scamming/spoofing. Typical phishing or spear phishing scams usually include a malicious URL or attachment, that attempts to install malware or to gather more ...

Protecting Your Organization’s Reputation – Part 1
Organizations can get a bad reputation from a variety of externally initiated and/or internally created issues, such as: poor customer service, spamming/spoofing, CEO/CFO spear phishing scams, leakage of customer personal/financial/health information, ...