Explore our collection of resources, whitepapers, policies, and guides.

Media Format

Category

Tag

Rapid technological advancement and rising global connectivity is reshaping the way the world is functioning. From higher productivity to improved customer satisfaction, technology has played a critical role in the growth of businesses across the world. However, the consequential bad news is that technological advancements have also made organizations increasingly vulnerable to digital risks. However, this does not mean that businesses must compromise on growth and advancement for the sake of security.
Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. Identify, understand and learn from past mistakes or failures, and adopt a more proactive and preventative approach to your business' cybersecurity strategies moving forward.
When your employees use their work email on websites like the ones listed below, it makes your business vulnerable to a breach. With our Dark Web Monitoring, we can detect if your company is at risk due to exposed credentials on 3rd party websites.
Microsoft takes the security of their platform very seriously, but that doesn't protect you from your own people, who are often performing high-risk actions within these applications on a regular basis, regardless of whether their actions are accidental or malicious.
Even in ordinary times, overseeing a remote workforce can be a challenge for multiple reasons - ensuring availability of all necessary tools, managing remote endpoints and having a fail-safe contingency plan. However, the current global health crisis has made things that much more complicated. In a matter of weeks, COVID-19 has drastically changed life as we know it, forcing us to change the way we live and work. Your business is no exception to this change as you transition to survive with a primarily (or fully) remote workforce.
COVID-19 has affected every corner of the world - including the Dark Web. As we've monitored and analyzed the Dark Web in 2020, we've discovered trends that point to today's biggest cybersecurity threats and gained insight into the risks of tomorrow.
No matter which metrics you analyze, 2019 was a devastating time for data security. The year was a continuation of a disturbing trend that has produced ominous results in four key categories: cost, size, impact, and time. For instance, according to the Ponemon Institute - 2019 Cost of a Data Breach study the cost of a data breach reached $3.92 million, an all-time high and 12% increase in just five years.
Many business owners - and the IT professionals they rely on - focus on protecting their companies from external threats - the lone hacker out for a large ransom, the industry competitor pilfering secrets, or organized cyber-criminals with sophisticate phishing schemes, etc. But what about internal threats?
Working remotely is rapidly becoming a new standard operating procedure, which is why we've put together a list of 21 best practices to help you maintain a strong security strategy in 2021, regardless of where or how you get your work done.
This document directs planning, preparation and exercises for pandemic disease outbreak over and above the normal business continuity and disaster recovery planning process. The objective is to address the reality that pandemic events can create personnel and technology issues outside the scope of the traditional business continuity disaster recovery planning process, as potentially some, if not the entire, workforce may be unable to come to work for health or personal reasons.
The purpose of this policy is to establish the requirement that all business units supported by your company security team develop and maintain an SRP. This ensures that the security incident management team has all the necessary information to formulate a successful response should a specific security incident occur.
The purpose of this policy is to establish a standard for strong password creation and protection.
The purpose of this email policy is to ensure the proper use of the your company email system and make users aware of what your company deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within the company network.
This policy defines the requirement for a baseline disaster recovery plan to be developed and implemented by your business that will describe the process to recover IT systems, applications and data from any type of disaster that causes a major outage.
The purpose of this policy is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network systems and services, and legal issues.
This Webinar walks you through many ways employees can introduce Dark web threats to you network...and how Vivitec eliminates and proactivly prevents these introductions. It also explains how to receive a complimentary Dark Web scan and Network assessment.
The COVID-19 pandemic has changed everything and it looks like remote workers are here to stay. Along with this the FBI has reported an increase in cyberattacks to 4,000 per day in 2020, which is 400 percent higher than the attacks reported before the onset of the coronavirus. The trend in increasing cyberattacks is expected to continue well into the future. Given these circumstances, the best solution is to build your cyber resiliency and protect yourself and your remote workers from unforeseen attacks.
To protect your company against cyberattacks and data breaches, you need to constantly evolve and grow to stay one step ahead of cybercriminals. The moment you lower your guard, there's every chance a nefarious cybercriminal will look to exploit any vulnerabilities. With some or all of your employees working remotely, it won't take much to breach your defenses. In fact, all it could take is a password shared publicly on a team chat app, an accidental click on a phishing link, or confidential company information accessed through a public Wi-Fi connection.
Since disasters happen so infrequently, management often ignores the disaster recovery planning process. It is important to realize that having a contingency plan in the event of a disaster gives your company a competitive advantage. This policy requires management to financially support and diligently attend to disaster contingency planning efforts. Disasters are not limited to adverse weather conditions. Any event that is likely to cause an extended delay of service should be considered.
Over the last few years, we have seen many companies offer full time or part time remote work options for their employees. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary infrastructure was in place to deal with cybersecurity threats.