DBIR 2017

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

How To Stay Cybersecure This Summer Vacation

Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.

Seriously?! Can You Not Do That? | Chapter I - Bad Habits and InfoSec Apathy

People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.

The Far-Reaching Effects of a Malware Attack

When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.

Penalties For Insecure Employees. Yes? No?

In today's breach-a-day environment, should companies issue penalties to insecure employees? Preempt’s Heather Howland thinks so. But just how severe should these penalties be? Let's find out.