February 6, 2019
Compliance is without a shadow of a doubt a cornerstone of every modern business model. So many enterprises are falling short in their aspirations to “touch the sky” after failing to play by the government-established rules.
February 4, 2019
Games that have too many rules usually don’t stick with people, but the business game is an exception. One could say that it has a pile of regulations and absolutely no mercy – and would be right.
January 30, 2019
As email continues to be the most common vector of all social cyber-attacks (96%), phishing has become increasingly common. According to a recent Verizon report, phishing and pretexting actually represent 98% of social incidents and 93% of breaches.
January 24, 2019
How often do you follow the wise advice from the “Measure Twice, Cut Once” proverb? And this one: “Trust, but Verify”? After the incident that happened to me, I could say I did become wiser.
January 22, 2019
I recently wrote a message, attached an annual financial report to it and clicked Send. One second later, a genius idea crossed my mind – to check the report for orthographic mistakes. All I could think afterward was: “What was I thinking when I clicked…
January 17, 2019
Did you know that the current email protocol dates back to the 1980s and has yet to be properly overhauled? In fact, usage of a regular email potentially violates dozens of EU GDPR articles, which may lead up to €20 million in fines. Yes, it is that bad.
January 14, 2019
The dreaded day has come. The two-factor authentication is no longer a reliable safety mechanism for your account credentials.
December 25, 2018
You know what they say: If it ain’t broke, don’t fix it. This may apply to your grandma’s old TV sitting in the corner of the room in her summer home in Florida, but it is the complete opposite of how cyber security works. You see, the vast majority of…
December 21, 2018
European Union’s communications network, known as COREU, has been compromised revealing sensitive cables and shedding light on its cybersecurity vulnerabilities exploited by attackers. The trove of disclosed cables exposed data labeled limited and…