<
>

Are You a Password Recycler or Cycler? One is a Security Best Practice, the Other, a Disaster Waiting to Happen

By Morey Haber, CTO & CISO at BeyondTrust Are you a recycler? Over the years, we’ve learned some difficult lessons about recycling. Having “disposable” everything while convenient is not good for the...

The Best Password Advice Ever

Back in April this year, a blog from Microsoft stated their position on the concept of expiring passwords. In a blog post which discussed security for Windows 10, they made it clear that the long accepted practice of expiring...

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears similar to a legitimate one in...

DON’T LET STOLEN PASSWORDS MAKE YOU EASY PREY FOR CYBER CRIMINALS

By Morey Haber, CTO & CISO at BeyondTrust   If you were a cyber criminal, imagine what you could do with a cache of stolen passwords. Perhaps you might launch a brute force attack against targeted organisations. Maybe...

Business Email Compromise Explained

What is Business Email Compromise? Business Email Compromise (BEC) refers to fraudulent emails used by cybercriminals to imitate the identity of another party or person in order to scam or defraud a company, its employees,...

BIOMETRIC DATA: RIPE FOR ABUSE AND MISUSE?

by Morey Haber, CTO at BeyondTrust    When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly...

Cyber attacks, building a robust defence as easy as 1,2,3

by James Bergl, Director, Datto APAC The cybersecurity landscape in Singapore and the wider Asia-Pacific region continues to evolve, and the past two years have brought some of the worst cyberattacks we have seen to this...

WHEN A SPEAR PHISHER COMES FOR YOU

by Morey Haber, CTO at BeyondTrust   For starters, this is a true story, and it happened to me. Its relevance to modern cyberattacks is important because, due to a hardware failure, I began engaging with...

Why Businesses Cant Afford to Ignore Ransomware

One of the biggest threats in cybersecurity today is ransomware. Over the last couple of years, many businesses have fallen victim to ransomware attacks which led to millions of dollars of losses. Among the most devastating...

How to Secure Sensitive Data When Data Is Always Accessible

Protecting sensitive information from prying eyes or unauthorised access has always been an important part of business long before the digital revolution. While advancing technology is making data more accessible and actionable...