Cyber Security drills

There's no mistakes about it – cyber security drills are necessary. When an unforeseen situation occurs, you would want the personnel with key passwords to be contactable, the firewall working properly, your cloud service provider to be available, and backups...

Read More
hipaa compliance cloud

For many organizations in the United States, HIPAA compliance is critical to them. However, adhering to cloud security compliance regulations can be a time-consuming and frustrating process for some. If you are new to HIPAA, this post explains why it...

Read More
data security landscape

The data security landscape is constantly evolving. The state it is currently in can vary as quickly as in a month. The irreversible shifts happen not only because of changing regulations, e.g. the enactment of the European Union's General Data...

Read More
Cross-Site Scripting

Also known as XSS, cross-site scripting attacks come in two major forms – reflected and stored (sometimes referred to as persistent). Reflected XSS is the process of reflecting malicious script into a page link. Stored XSS is the process of...

Read More
fileless malware

Cyber criminals are much like cockroaches, i.e. they are continuously adapting. When new security measures are developed and rolled out, they will get to work, finding a loophole that they can exploit. Simply put, they adapt to keep pace in...

Read More