Posts by author
Panda Security
Are your employees on the cybersecurity naughty list?
The holiday season is often described as the “most wonderful time of the year”, especially for businesses as they gear up for a busy shopping…
How to Identify a Business Email Compromise Attack
Business email compromise attacks have skyrocketed over the last few years. Hackers use this strategy to target corporate or publicly available email accounts of executives…
US Postal Service exposed the details of 60 million people
A few weeks ago the United States Postal Service (USPS) patched up a vulnerability that has been revealing the details of sixty million people.
How to detect a critical security incident?
There are several ways to detect the whether the company is facing critical security incidents. With these measures their relevance can be evaluated.
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
Study: Americans Don’t Understand Basic Internet Safety
In our modern world, the internet is integral to daily life. The internet stores our files connects us with others and holds sensitive data like bank account credentials. So why don’t we treat internet security like we would real-life safety?
The risk of using phone numbers as authenticators for sensitive information
Find out how using mobile phones to authenticate sensitive information and accounts can pose a risk to your company’s cybersecurity.