Cloud and Data SecurityZeus Virus AKA Zbot – Malware of the Month, November 2019The Zeus Virus, or Zbot, is a crafty and undetectable strain of malware that has been rather resilient and shown a strong ability to evolve since its first detection in 2007. For that reason, it’s our …Read in 3 minutes
Cloud and Data SecurityIdentity Theft on the Dark Web: Understanding the Full Impact of a Data BreachThe dark web has made identity theft a “lucrative business” which is leading to more pervasive and ingenious attacks – often targeting your customer’s credentials. Learn how to protect your data, …Read in 4 minutes
Cloud and Data SecurityKovter – Malware of the Month, October 2019Kovter — a malware that has evolved from a trojan-based ransomware to a click fraud malware and then to a fileless one — is Spanning’s Malware of the Month for October 2019. Learn how Kovter works and …Read in 3 minutes
Cloud and Data Security Microsoft 365Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and BeyondMulti-factor Authentication (MFA) combines what the user knows (password), with what the user has (security token) and what the user is (biometric verification) to ensure user identity. Learn why this …Read in 4 minutes
Cloud and Data SecurityXML External Entity (XXE) Attacks — Web-based Application Security, Part 5XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they …Read in 3 minutes
Cloud and Data SecurityCIA Triad: Best Practices for Securing Your OrgThe CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the …Read in 3 minutes
Backup Cloud and Data SecurityForming a Backup Strategy: 4 Steps to FollowA comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow these four …Read in 4 minutes
Cloud and Data SecurityStegware aka Steganography Malware – Malware of the Month, July 2019Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware’s relatively easy implementation and …Read in 3 minutes
Cloud and Data SecuritySQL Injection Attacks (SQLi) — Web-based Application Security, Part 4SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that …Read in 4 minutes