Blog

Mar
13
Are those really the words from your CEO...or is it a scam?

temp-post-image


Imagine yourself going about your daily tasks when suddenly, the CEO contacts you. They need your assistance as someone forgot to provide gift cards during a customer visit and need you to purchase six $200 gift certificates and send the details directly to the CEO.



The message sender guarantees you a reimbursement within 24 hours, though you won't have the chance to call them for two hours as they will be attending meetings. This is an urgent matter; they urgently require gift cards.


Can you pause and consider if this type of request indicates suspicion? Would you be tempted to reach for your credit card in order to comply with the request?


Surprisingly, many employees fall victim to this gi...


Feb
23
Feb
19
2023 Data Privacy Trends That May Impact Your Compliance

temp-post-image


Since the inception of the internet, data privacy has become an ever more pressing necessity. It's astounding how much personal data is now being transmitted over computer networks; now it has become imperative to safeguard it.


HIPAA, GDPR or any other industry-based privacy rules must be adhered to by most companies. By 2024, 75% of the world's population will have their personal data secured under one or more privacy regulations.


Data privacy compliance does not have to be the domain solely of large enterprises. It goes hand-in-hand with cybersecurity, and applies equally to all businesses regardless of size.


Between July 2020 and August 2021, GDPR violations increased by 113.5%, leading to ...


Nov
14
Checklist to Enhance Digital Offboarding for Employees

temp-post-image


Digital footprints are ubiquitous in today's workplace. Once an employee begins working, they create their digital footprint by being provided with a company email address and login credentials for their application. You may even be able to update their LinkedIn page through this method.



When an employee departs the company, there is a process that must be followed: decoupling the employee from all technological assets of the business. This step is essential for cybersecurity purposes.


It is never a wise practice for a former employee or contractor to send malicious emails via their work email address to all of your customers. The computer of such an individual could contain sensitive files ...


Nov
06
Insider Threats Have Grown exponentially Serious Here's How To Counter Them


temp-post-image

Insider attacks are one of the most challenging to detect. Anyone with access to your company's network and data is considered an "insider", whether through a login or other authorized connection.


Insiders have the potential to bypass security measures, granting access to the system despite supposed protections against intruders. Unfortunately, these safeguards won't activate since a log-in user isn't considered an intruder.


Ponemon Institute recently released three sobering statistics that underscore the urgency of addressing this threat. Insider threats are becoming more difficult to detect and more prevalent.


According to the report, over the past two years:



  • Organizations take 85 days to sto...

Oct
02
5 Mistakes Companies Make in the Digital Workplace


temp-post-image

Companies across the globe were forced to adapt their business models in light of the pandemic. The traditional model, where everyone worked in one office together, no longer worked and many firms had no choice but to switch over to remote working.



Estimates suggest that 70% of full-time employees worked from home during the worst pandemic. Even now, remote work remains an option; 92% of respondents expect to do so at least one day per week.


Businesses have had to reevaluate their policies and tools in response. Many firms have had to alter how they work, transitioning to a digital cloud workspace for hybrid teams.


This transition has brought with it many new advantages, such as:



  • Employers and ...