banner-blog.jpg

BLOG

RSA 2017 is a Wrap – Were Credential Theft and Phishing on Your Radar?

Posted by Greg Maudsley on Mar 2, 2017

There were many hot topics and cybersecurity themes at this year’s RSA Conference in San Francisco, from ransomware, to Sec Ops, to post breach mitigation.

Read More

Tags: cybersecurity, phishing, credential theft, phishing prevention, Adaptive Clientless Rendering, isolaton

Addressing the Australian Privacy Amendment (Notifiable Data Breaches) Bill

Posted by Jay Kelley on Feb 27, 2017

Just over a week ago, the Parliament of Australia passed the Privacy Amendment (Notifiable Data Breaches) Bill 2016 requiring any Australian public sector – including most Australian Government agencies, except for intelligence agencies, private sector and not-for-profit organisation with annual revenue of AU$3 million (US$2.3 million) or greater to disclose any data breach involving an individual’s personally identifiable information (PII), including but not limited to tax file number information (similar to the United States’ social security number or SSN), credit card information, and credit eligibility information. The Bill also applies to specific organisations with revenue under AU$3 million annually, including private sector health services, gyms, weight loss centres, child care centres, private schools, organisations selling or purchasing personal information, credit reporting organisations, and even individuals handling personal information as a business. According to some publications, though, if taken literally, the language in the new Bill appears to require an organisation to disclose information even if they only believe a breach has occurred.

Read More

Tags: cybersecurity, credential theft, Adaptive Clientless Rendering, notifiable data breaches, personally identifable information, isolaton

Menlo Security Rings in 2017 with Channel Partner Program

Posted by Doug Schultz on Jan 30, 2017
Read More

Tags: malware, cybersecurity, phishing, threats, security strategy, channel partner

Malware & Credential Theft are the Problems, not Russia

Posted by Greg Maudsley on Jan 19, 2017

 

Read More

Tags: malware, cybersecurity, phishing, isolation, credential theft, gartner, anti-phishing

Browsing the Web is a Leap into the Unknown

Posted by Kowsik Guruswamy on Dec 13, 2016

Users must recognize that they are taking a significant risk when connecting directly to the Internet. The new Menlo Security State of The Web report reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky.  

Read More

Tags: malware, cybersecurity, blog, isolation, malware vulnerabilities, cyber theft, security strategy, anti-phishing, state of the web

Yes Muni, You Can Limit Ransomware Attacks

Posted by Peter Lunk on Dec 1, 2016

The San Francisco Bay Area was enjoying a US Thanksgiving holiday weekend when ransomware hit its municipal transportation agency, locally known as Muni. Over 900 office computers were affected, with Muni data locked up as the hacker demanded 100 bitcoins, or roughly $73,000, which the San Francisco Municipal Transportation Agency (SFMTA) never considered paying, according to the San Jose Mercury News.

Read More

Tags: malware, cybersecurity, isolation, ransomware, cyber theft, anti-phishing, San Francisco, bitcoin, Muni, remote browsing

10 Reasons Why You Shouldn’t Consider Isolation!

Posted by Jason Steer on Nov 29, 2016

This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking. 

Read More

Tags: malware, cybersecurity, isolation, security, ransomware, malicious code, security strategy, anti-phishing, phishing prevention, spear-phishing

Protecting Asian Business from Cyberattack – Isolate Risky Content

Posted by Stephanie Boo on Nov 10, 2016

Across the Asia Pacific, cyber security communities are sharing information about malicious actor techniques from other regions, in hopes of avoiding copycat attacks. In one case, data theft from a US government agency exploit was foiled when individual users repeatedly asked IT to have their malware-ridden laptops re-imaged. It turns out, it wasn’t just malware that was the security issue – the malware was a cover up for a sophisticated ring of insider data-stealing activities. Each time the externally-based ring leader thought their data stealing attempts might be discovered, the malware was inflicted on internal users to force a reimage and cover their tracks.

Read More

Tags: malware, cybersecurity, isolation, security, malware vulnerabilities, phishing prevention, Australian Information Security Association

The Patient Zero Myth

Posted by Greg Maudsley on Oct 26, 2016

In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where its corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign.

Read More

Tags: malware, cybersecurity, blog, phishing, isolation, security, malicious code, anti-phishing, phishing prevention

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, cybersecurity, phishing, isolation, pdf, security, ransomware, risk, malicious code, malware vulnerabilities, cyber theft, security strategy, email attachments

Connect with us

Lists by Topic

see all

Recent Posts