-
Data Breach Versus Data Leak: What’s The Difference?
Some terminology in the cybersecurity world can be slightly confusing. One example is the difference between two similar terms: data leak and data breach. People sometimes use these terms interchangeably to describe situations where sensitive data is exposed. However, the difference between a data leak and a data breach is concrete in some ways. Knowing…
-
5 Strategies for Cutting the Costs of Insider Threats
The costs associated with insider threats continued to rise in 2022. This is bad news for organizations that are already under financial pressure from the uncertainty of the economy. As interest rates continue to climb and customers become more conservative about how they spend, the last thing that any organization needs is to be putting…
-
Types of Insider Threats Risking Your Company’s Security
Businesses face myriad cybersecurity risks, from phishing to unauthorized access of proprietary information. While restricting access rights and maintaining strict security measures can help, potential insider threats are always a risk. Organizations must effectively monitor for signs of insider threats to prevent financial loss or the compromise of critical assets. Creating an insider threat program…
-
Lessons Learned from 7 Real Insider Threat Examples
Organizations must navigate myriad security threats. While many cyber threats come from malicious actors outside the organization, insider threats can be even more devastating to a business. Insider threat prevention should be a top priority for security teams. But what are these cyber attacks, and what do they teach us about how to protect critical…
-
Where Insider Threats Hide Out in a Segmented Network
When it comes to insider threats and cybersecurity in general, experts often discuss how to practice policies of containment, and use these to mitigate threats. One fundamental way to do this is through the process of network segmentation. What is network segmentation? Network segmentation means that you essentially create smaller subnetworks linked to each other,…
-
6 reasons why SMBs love OpenText MDR
In today’s digital-first world, small and medium-sized businesses (SMBs) face cybersecurity challenges that grow more complex by the day. SMBs are prime targets for attackers hoping to gain a foothold inside any organization that doesn’t have extensive security measures. As threats increase, so does the need for comprehensive, reliable, and accessible protection. This is where…
-
Top 5 roadblocks for MSPs and how OpenText MDR clears the way
The managed service provider (MSP) industry is booming with opportunities. At the same time, MSPs face the challenge of balancing customer satisfaction with profitability, making strategic decisions more important than ever. For 35% of MSPs, building cyber resiliency for customers is a top strategic priority, but that goal often runs up against resource constraints and…
-
Top 5 reasons MSPs choose OpenText MDR
It’s an exciting time to be a managed service provider (MSP). More than ever, small and medium businesses (SMBs) are looking to MSPs as trusted advisors to help safeguard them from today’s growing cyber threats. One of the services in high demand right now? Managed detection and response (MDR). When asked about their biggest growth…
-
Do you actually need a VPN? Your guide to staying safe online!
With the rise of online scams and privacy risks, virtual private networks (VPNs) are becoming more popular for day-to-day use. Or at least I feel like they are based on the number of ads I hear for them on my favorite podcasts. So maybe you’ve heard of VPNs but aren’t actually sure what they are.…
-
Nastiest Malware 2024
Steam the Webinar on demand HERE As we look back on the cybersecurity landscape of 2024, it’s clear that the world of digital threats continues to evolve at an alarming pace in parallel with AI. This year has seen ransomware groups adapt and innovate, pushing the boundaries of their malicious capabilities and evasiveness from law enforcement. In our…