With Cyber Monday just one week away, learn more about how consumers feel about the security of online shopping and what you can do to help prevent your data being stolen.
Category: Cybersecurity (Page 1 of 4)
National Cybersecurity Awareness Month (NCSAM) is observed every October to raise awareness around the importance of cybersecurity. As we head into a new month, we remain focused on promoting the importance of practicing vigilance about cybersecurity year-round.
At SiteLock, our mission is to help create a secure Internet for all users. Regardless of industry, age or education, cybersecurity concerns us all. Cyberattacks can impact individuals as young as children, and organizations as large as Yahoo. Learn from the examples we provide in this blog as SiteLock President, Neill Feather, weighs in on why cybersecurity should matter to you.
Regardless of whether you’re a registered Democrat or Republican, your voter data could be in jeopardy of being compromised by cybercriminals. This election cycle has brought on attacks in 20 states, leading to two successful data breaches. Learn why 34 percent of voters believe this election will be or has been hacked.
We live in a world where technology rules. From our phones to our cars, we are constantly connected to something, somewhere, at all times. In most cases, the convenience of technology enhances the quality of our lives. But as consumers of technology, there are risks and threats we need to be aware (and beware) of. We don’t mean to spook you, but let’s talk about the scary side of the cyber world.
The term, “security by obscurity” implies that the less popular and attention grabbing your website is, the less likely it is to be targeted by cybercriminals. The truth is, there is no such thing as “too small to hack.” Read our infographic to learn more.
“Law firms are tremendous concentrations of really critical, private information. Infiltrating those computer systems is a really optimal way to obtain economic and personal information,” a statement on the state of security for law firms by Bradford Bleier, unit chief of FBI cyber division.
Every day, law firms manage sensitive information for their clients, including mergers and acquisitions, investments, business strategies and other intellectual property. This has made them a prime target for phishing and cyberattacks. In fact, Cisco’s 2015 Annual Security Report named law firms as the seventh highest target for cybercriminals. October is Cybersecurity Awareness Month, which is why now, more than ever, it is necessary to identify and resolve vulnerabilities within your firm.
“Websites are the one IT asset you want to be publicly available. You want the customer to engage and interact. But you still need it to be safe.” – Neill Feather, President at SiteLock
October is National Cybersecurity Awareness Month (NCSAM), a month dedicated to raising awareness around the importance of cybersecurity. At SiteLock, we strive to make the Internet a safer place by protecting websites and educating users about cybersecurity risks and solutions.
As part of our commitment to cybersecurity, SiteLock has developed a report in conjunction with Crowd Favorite to distinguish key website features that increase the likelihood of a website compromise. The report also includes five basic security steps all organizations should take to protect themselves from exposure and mitigate cyber risks. This blog provides a recap of the report. You can also download the full report here.
In honor of National Cybersecurity Awareness Month (NCSAM), SiteLock has published new website security data to help raise awareness about the need for increased website protection and cybersecurity.
Over 760,000 websites are breached each year. However, only 6 percent of website owners use proactive website monitoring for suspicious activity, while 84 percent don’t find out about website attacks until after they’ve been compromised.
By Kevin Tolly
Founder, The Tolly Group
Who works 24/7? Not you, I hope – but hackers around the globe are busy trying to compromise systems 24 hours a day, seven days a week. “Next-gen” is not just a convenient marketing term, it is very accurate label for new types of threats and new types of solutions designed to counter those threats.
The basic nature of PC and server (aka “endpoint”) security and threats to same had not changed in many years. For years, the enemy would be the rogue program (.EXE) or Word macro that would find its way on to our system and either destroy our data or perhaps surreptitiously take control of our system either to steal our data or add our system to its army of drones – or both.
The traditional endpoint security solution would rely on its researchers to learn the digital fingerprints – usually referred to as the signature – of the virus. Upon detection, the entire offending program or macro would be isolated (quarantined) and, ultimately, deleted.