Explore our collection of resources, whitepapers, policies, and guides.

Media Format

Category

Tag

The purpose of this policy is to establish the requirement that all business units supported by your company security team develop and maintain an SRP. This ensures that the security incident management team has all the necessary information to formulate a successful response should a specific security incident occur.
The purpose of this policy is to establish a standard for strong password creation and protection.
The purpose of this email policy is to ensure the proper use of the your company email system and make users aware of what your company deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within the company network.
This policy defines the requirement for a baseline disaster recovery plan to be developed and implemented by your business that will describe the process to recover IT systems, applications and data from any type of disaster that causes a major outage.
The purpose of this policy is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network systems and services, and legal issues.
This Webinar walks you through many ways employees can introduce Dark web threats to you network...and how Vivitec eliminates and proactivly prevents these introductions. It also explains how to receive a complimentary Dark Web scan and Network assessment.
The COVID-19 pandemic has changed everything and it looks like remote workers are here to stay. Along with this the FBI has reported an increase in cyberattacks to 4,000 per day in 2020, which is 400 percent higher than the attacks reported before the onset of the coronavirus. The trend in increasing cyberattacks is expected to continue well into the future. Given these circumstances, the best solution is to build your cyber resiliency and protect yourself and your remote workers from unforeseen attacks.
To protect your company against cyberattacks and data breaches, you need to constantly evolve and grow to stay one step ahead of cybercriminals. The moment you lower your guard, there's every chance a nefarious cybercriminal will look to exploit any vulnerabilities. With some or all of your employees working remotely, it won't take much to breach your defenses. In fact, all it could take is a password shared publicly on a team chat app, an accidental click on a phishing link, or confidential company information accessed through a public Wi-Fi connection.
Since disasters happen so infrequently, management often ignores the disaster recovery planning process. It is important to realize that having a contingency plan in the event of a disaster gives your company a competitive advantage. This policy requires management to financially support and diligently attend to disaster contingency planning efforts. Disasters are not limited to adverse weather conditions. Any event that is likely to cause an extended delay of service should be considered.
Over the last few years, we have seen many companies offer full time or part time remote work options for their employees. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary infrastructure was in place to deal with cybersecurity threats.
Once compromised, stolen credentials have a variety of uses, and they enable attackers to infiltrate organizations and steal sensitive information. It only takes a single stolen credential to gain access to an organization's infrastructure and cause devastation. Stolen credentials are a valuable commodity because they can be used in several different ways.
Cybercriminals use the profile information of your users and organization to create targeted spear-phishing campaigns designed to trick your users and steal login credentials. In most instances, they utilize an e-mail address of a trusted officer in the company like the CEO, CFO, and/or a key person in Human Resources. Cybercriminals attempt to hijack accounts, damage your organization's reputation, or gain access to your network. Both the increase in ransomware attacks and the prevalence of phishing scams reflect cybercriminals' desire to pursue soft targets that lack the resources or the resolve to adequately protect their IT infrastructure.
Having a cybersecurity preventative posture is paramount to your data security. If your business and/ or customer data is hacked you've just opened pandora's box of lawsuits, loss of brand integrity, loss of customer trust and many more concerning issues. The dark web has become a cybersecurity nightmare so your cybersecurity readiness plan should include preventative measures to defend against dark web and its minions.
With headlines full of cyberattacks and security breach victims, it is time to take the risks seriously. The success and survival of your business will be determined by your ability to overcome cybersecurity threats or breaches. You need a cyber readiness plan that includes elements of prevention, business continuity and recovery strategies. In this article we'll touch on prevention from the Dark Web attackers.
As part of your cybersecurity readiness plan, it is imperative to understand the most prized possession of cybercriminals. Consumers are the victims, and their credentials are the trophies of the cybercriminal.