Email phishing attacks are sent to us at work, home, and anywhere else we have email. Most of us use email filters to check these emails and cut down the number of bad messages we receive, but sometimes these filters can be bypassed. Avanan’s Global Phish Report analyzed more than 55 million emails and found that 1 out of every 100 contained a phishing attack.
Learn moreIn response to the increasing number of massive data breaches over the last several years, the Colorado legislature passed new requirements for protecting the personal information of Colorado residents. The Colorado Protections for Consumer Data Privacy (HB18-1128) applies to public and private organizations that handle, process, store or otherwise have access to electronic or printed personally identifiable information (PII) of Colorado residents.
Learn moreWith the rapid pace that technology evolves, understanding how those changes can impact business is important.
Learn moreThis year marked the 26th annual DefCon, the annual hacker conference attended by thousands of people ranging from high school students to well-known security researchers and infamous personalities in the industry.
Learn moreThe General Data Protection Regulation (GDPR) went into effect on May 25, 2018. With fines as high as €20 million or 4% of global revenues, the GDPR cannot be ignored. How do you know if the regulation applies to your organization and how can you comply?
Learn moreWeb application vulnerabilities are a top target for cyber criminals. Websites, applications, servers and supporting infrastructure are exposed to the internet via web applications and thus are under constant attack. Many organizations perform network vulnerability scans on internet facing networks and systems, but often ignore web applications. The tests included in the network vulnerability scans generally do not test web applications and certainly do not perform deep vulnerability testing inside the application.
Learn moreRubinBrown Cyber Security Center of Excellence – Security You Need to Know. Testing your cyber security on a regular basis is part of sound strategy to identify and eliminate risks in the environment. Penetration testing, or "white hat" hacking, tests the external and internal network to assess the effectiveness of controls. Whether you are demonstrating due care in addressing cyber security threats or addressing compliance requirements, penetration testing is a core component of regular security assessment efforts.
Learn more