Explore our collection of resources, whitepapers, policies, and guides.

Media Format

Category

Tag

The repercussions of a ransomware attack aren't limited to just a financial loss, in fact, a ransomware attack can grind your business to a halt and cause severe damage on multiple fronts.
The repercussions of a ransomware attack aren't limited to just a financial loss, in fact, a ransomware attack can grind your business to a halt and cause severe damage on multiple fronts.
When it comes to cybersecurity, unfortunately, an increasing number of businesses around the world are living this nightmare with countless others coming in the line of fire, including yours. Ransomware is growing rapidly and crippling businesses worldwide, making up 27 percent of all malware incidents in 2020.
The best way to start managing your digital risks is by performing comprehensive security risk assessments regularly. After all, how would you know what your current vulnerabilities or gaps are and where you biggest security challenges lie without an "under the skin" examination? With a risk assessment, you can measure your security posture against various internal and digital threats and determine how equipped you are to deal with these risks. When you perform a security risk assessment you can proactively.
Rapid technological advancement and rising global connectivity is reshaping the way the world is functioning. From higher productivity to improved customer satisfaction, technology has played a critical role in the growth of businesses across the world. However, the consequential bad news is that technological advancements have also made organizations increasingly vulnerable to digital risks. However, this does not mean that businesses must compromise on growth and advancement for the sake of security.
Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. Identify, understand and learn from past mistakes or failures, and adopt a more proactive and preventative approach to your business' cybersecurity strategies moving forward.
When your employees use their work email on websites like the ones listed below, it makes your business vulnerable to a breach. With our Dark Web Monitoring, we can detect if your company is at risk due to exposed credentials on 3rd party websites.
Microsoft takes the security of their platform very seriously, but that doesn't protect you from your own people, who are often performing high-risk actions within these applications on a regular basis, regardless of whether their actions are accidental or malicious.
Even in ordinary times, overseeing a remote workforce can be a challenge for multiple reasons - ensuring availability of all necessary tools, managing remote endpoints and having a fail-safe contingency plan. However, the current global health crisis has made things that much more complicated. In a matter of weeks, COVID-19 has drastically changed life as we know it, forcing us to change the way we live and work. Your business is no exception to this change as you transition to survive with a primarily (or fully) remote workforce.
COVID-19 has affected every corner of the world - including the Dark Web. As we've monitored and analyzed the Dark Web in 2020, we've discovered trends that point to today's biggest cybersecurity threats and gained insight into the risks of tomorrow.
No matter which metrics you analyze, 2019 was a devastating time for data security. The year was a continuation of a disturbing trend that has produced ominous results in four key categories: cost, size, impact, and time. For instance, according to the Ponemon Institute - 2019 Cost of a Data Breach study the cost of a data breach reached $3.92 million, an all-time high and 12% increase in just five years.
Many business owners - and the IT professionals they rely on - focus on protecting their companies from external threats - the lone hacker out for a large ransom, the industry competitor pilfering secrets, or organized cyber-criminals with sophisticate phishing schemes, etc. But what about internal threats?
Working remotely is rapidly becoming a new standard operating procedure, which is why we've put together a list of 21 best practices to help you maintain a strong security strategy in 2021, regardless of where or how you get your work done.
This document directs planning, preparation and exercises for pandemic disease outbreak over and above the normal business continuity and disaster recovery planning process. The objective is to address the reality that pandemic events can create personnel and technology issues outside the scope of the traditional business continuity disaster recovery planning process, as potentially some, if not the entire, workforce may be unable to come to work for health or personal reasons.
The purpose of this policy is to establish the requirement that all business units supported by your company security team develop and maintain an SRP. This ensures that the security incident management team has all the necessary information to formulate a successful response should a specific security incident occur.
The purpose of this policy is to establish a standard for strong password creation and protection.
The purpose of this email policy is to ensure the proper use of the your company email system and make users aware of what your company deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within the company network.
This policy defines the requirement for a baseline disaster recovery plan to be developed and implemented by your business that will describe the process to recover IT systems, applications and data from any type of disaster that causes a major outage.
The purpose of this policy is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network systems and services, and legal issues.
This Webinar walks you through many ways employees can introduce Dark web threats to you network...and how Vivitec eliminates and proactivly prevents these introductions. It also explains how to receive a complimentary Dark Web scan and Network assessment.