Facts & Stats

The Coronavirus and Cybercrime: What You Need to Know

The coronavirus is causing a global crisis of historic proportions—it’s not only changing the way we work, learn, travel, and interact with each other, but also increasing online security risks for both individuals and organizations: With the coronavirus forcing millions to work and study from home and interact more online than in person, cybercrime and cyber-attacks […]

The Coronavirus and Cybercrime: What You Need to Know Read More »

global cybersecurity regulation compliance

Whitepaper: Navigating Cybersecurity Compliance Amid Complex Global Regulation

Organizations often find cyber regulations either inconsistent, redundant, or impossible to keep up with, particularly if they operate on a global scale. As cybersecurity becomes more regulated, avenues for litigation against companies will expand. Download our free whitepaper to understand how to establish an ongoing, risk-based global cyber regulation compliance strategy.

Whitepaper: Navigating Cybersecurity Compliance Amid Complex Global Regulation Read More »

cybersecurity trends 2020

10 Cybersecurity Trends To Watch Going Into 2020

Cybercrimes are becoming more frequent and more damaging. As the world becomes increasingly digitized, cybersecurity can no longer be put on the backburner. Every October, National Cybersecurity Awareness Month (NCSAM) is held to raise awareness of the growing concerns of the safety and security of the digital world. For NCSAM 2019, we’ve put together a

10 Cybersecurity Trends To Watch Going Into 2020 Read More »

risk based approach to cybersecurity

5 Reasons Why Your Cybersecurity Approach Should Be Risk-Based

While cyber threats may not be in your control, your cybersecurity strategy is – and it should be risk-based. A risk-based approach to cybersecurity means that your security team is primarily concerned with reducing your organization’s likelihood and vulnerability in case of a cyberattack. A risk-based approach begins with an understanding of your business’s critical

5 Reasons Why Your Cybersecurity Approach Should Be Risk-Based Read More »

doordash data breach

DoorDash Data Breach Exposes Nearly 5 Million Users. Here’s How to Protect Yourself

The food delivery service confirmed a data breach exposed the records of 4.9 million, including customers, delivery workers, and merchants. Hackers stole information including: names, email addresses, home addresses, phone numbers, passwords, and partial credit card and bank account numbers. The passwords exposed the DoorDash data breach were “hashed and salted” -this means there were

DoorDash Data Breach Exposes Nearly 5 Million Users. Here’s How to Protect Yourself Read More »

cybersecurity law

Cybersecurity is No Longer Good-to-Have, It’s the Law

By now we should all know that human error accounts for 95% of data breaches, and that cyber security should be a company-wide concern. We know cybersecurity is good-to-have, and now, finally, it is also necessary to have. While it may have taken government regulations a bit to catch up with cyberspace, there has been

Cybersecurity is No Longer Good-to-Have, It’s the Law Read More »

why data breaches happen

Data Breaches 101: Why They Happen and What Data Gets Stolen

In the past years, headlines like “Company Loses Millions From Recent Data Breach” have become more common than ever. Even major international brands like Yahoo!, Marriott International, Equifax, and many others have suffered the wrath of hackers looking to make a profit. What is a data breach anyway, and why does it happen? What Is

Data Breaches 101: Why They Happen and What Data Gets Stolen Read More »

Exciting News: Cybint joins ThriveDX - Read the announcement or visit the site!