Recovering from a Negative Pen Test

Recovering from Negative Pen Test

When hiring a team to perform a penetration test, every organization is hoping that nothing negative is found and that they receive a clean bill of health. In reality, pen test results vary from company to company depending on the maturity of the organization’s security. While the majority of the pen test team’s job is […]

E-commerce Companies Holiday Security: How to Ensure your Supply Chain is Secure

E-commerce Companies Holiday Security

The holiday season is a busy one for shoppers, retailers, and customers alike. Unfortunately, the upswing in holiday shopping presents cybercriminals with many opportunities to disrupt e-commerce operations. While an organization’s own network may be well-secured, this doesn’t mean the organization is safe from attack. Supply chain attacks have become increasingly common as hackers target […]

7 Tips for Configuring a Robust SIEM

Deploy Robust SIEM

Security information and event management (SIEM) software fulfills an organization’s most crucial role: It protects an organization’s most sensitive data and establishes proof the business is doing so to meet compliance requirements. This complex set of technologies provides an overall view of the effectiveness of your security stack, acting as a force multiplier for the […]

Top 5 Warning Signs When Opening Email

Training employees to identify suspicious emails Emails are a core part of what makes modern business practices possible. With projections in 2019 exceeding over 240 billion business-related emails a day, the ability to send messages rapidly around the world has reshaped multinational business proficiency. The downside? It’s also an extremely lucrative tool for cyber crime.  […]

Vaporworm Threat: What You Need to Know About the Next Evolution of Malware

Vaporworm threat

Malware is ever-evolving as attackers develop new variants to bypass or defeat enterprise network security defenses. Fileless malware, in particular, has created headlines in recent years thanks to its ability to bypass several of the protections employed by traditional antivirus solutions. The vaporworm threat has now emerged as the next evolution of malware. It combines […]

How Retailers can Protect Against Cybercrime this Holiday Season

The holiday season is not only a busy time for retailers but also presents a myriad of opportunities for cybercrimes to be committed. The November to January months are the retail industry’s most important selling time with sales during this time accounting for almost one-third of annual sales in some categories. According to a recent […]

5 Ways to Prevent Ransomware

For cybercriminals, ransomware has been a lucrative business in 2019.    For cybersecurity executives, prevention is top of mind; and with good reason. According to a recent McAfee Labs Threat Report, in Q1 2019 alone, ransomware attacks grew by 118%.   Ransomware attacks can be unsettling and sometimes devastating to an organization. Losing access to valuable […]

Cybersecurity 101: Getting Started

Cybersecurity basics

Setting up a cybersecurity program is important, but it can seem like a daunting task.  Organizations shouldn’t feel as if they should try to do everything overnight. This can be overwhelming and become counterproductive. When setting up a cybersecurity program, it’s important to get the basics solidly in place before acquiring and deploying defenses for […]

Security Implications of the Internet of Things

Devices connected to the Internet of Things (IoT) add substantial value to businesses and industries such as manufacturing, transportation, and utilities among others according to a recent Tech Pro Research Survey. By automating tasks and making functionality easily accessible to the average user, many devices, like Internet-enabled security cameras and medical devices, have the potential […]

New Podcast Features Avertium CEO

Episode 3 of Ackermann Marketing and PR’s new “Sweet Tea and Strategy” podcast features Avertium CEO Jeff Schmidt discussing the state of cybersecurity, emerging trends, and the future. Listen to the episode or read the transcript below: Tommy Smith:  Welcome to Sweet Tea and Strategy podcast, produced by Ackermann Marketing and PR. We’re speaking with business […]