Do You Know if Sensitive Data Is Leaving Your Network?

A microchip engineer was recently accused of stealing trade secrets using a clever technique. He allegedly sent data to his personal computer by hiding schematics in image files named for Pokémon characters.

A former Tesla employee is accused of taking a less technical approach, downloading trade secrets to his personal computer and submitting a different laptop for inspection to hide his activity.

Cybercriminals Targeting Unpatched Vulnerabilities

Despite months of dire warnings about the threat potential, researchers say the vast majority of vulnerabilities in the widely used Apache Log4j logging utility for Java software remain unpatched and actively exploited. New research suggests that more than 90,000 Internet-facing Java applications and nearly 70,000 servers remain exposed to the flaw that enables attackers to remotely execute code on compromised systems.

The Surprising Risks of Unsecured Printers and Multifunction Devices

The international hacktivist group Anonymous recently claimed it hacked hundreds of unsecured printers throughout Russia, using them to distribute anti-war messages. Despite their good intentions, the incident is just another reminder that printers, fax machines and multifunction devices are far more vulnerable to malicious exploits than most people realize.

IoT Attacks on the Rise. Are You Prepared?

Billions of Internet of Things (IoT) devices are being compromised each year as malicious actors exploit a variety of security gaps to organize botnets, steal data and mine cryptocurrency. While the IoT now represents the single largest attack surface for most organizations, few have taken steps to adequately secure their IoT environment.

How Private Is Your Email?

There’s a lot to like about email. It’s fast, cheap, easy and reliable. With the touch of a button, you can simultaneously send messages or documents to dozens of contacts located just about anywhere on the planet. You can also use it to sort, file and filter important personal and professional information.

3 Requirements for Secure Online File Sharing

File-sharing technologies are essential for the efficient exchange of information in the digital age. However, a recently resolved class-action lawsuit against the provider of a well-known file-sharing service illustrates the risks these solutions can introduce.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+