Cimcor Blog

Peyta Raises the Stakes for Businesses
Peyta Raises the Stakes for Businesses
  Last month it was AdylKuzz. Last week was Peyta/NotPeyta. How will next month's malware evolve? With each season, organizations can expect a new...
4 Things You Should Know about Your Information Security Architecture
4 Things You Should Know about Your Information Security Architecture
Business information is seemingly at a constant state of risk. Last week’s massive global cyberattack proved just how vulnerable many organizations...
4 Key Features to Look for in Your PCI Software
4 Key Features to Look for in Your PCI Software
So you’re looking for a PCI compliance software to help you comply with regulatory statutes. While there are many options out there, it is important...
How Host-Based Intrusion Detection (HIDS) Works
How Host-Based Intrusion Detection (HIDS) Works
With cyber attacks and hacking all over the news, building up your own company’s security may be on your mind. We know today that a firewall is not...
4 Reasons File Integrity Monitoring is Important for Enterprises
4 Reasons File Integrity Monitoring is Important for Enterprises
The data businesses create, share, and store is often the key to their success. Some even believe the information businesses posses is the most...
3 Ways to Mitigate the Human Factors of Cyber Security
3 Ways to Mitigate the Human Factors of Cyber Security
Before diving into how to mitigate the human factors of cyber security, perhaps it is best to understand what the term actually represents. The human...
Active Directory: Do You Need a Change Management Strategy?
Active Directory: Do You Need a Change Management Strategy?
If thinking of a set of keys, in which each key secures an area of your organization’s infrastructure, it makes sense to have each area only...
Detecting Invisible Malware
Detecting Invisible Malware
  WannaCry ransomware shook the healthcare industry, and more than 150+ countries around the globe by many estimates.  However,  as Selena...
Achieving NERC-CIP 10-2 Compliance With File Integrity Monitoring
Achieving NERC-CIP 10-2 Compliance With File Integrity Monitoring
Critical Infrastructure Protection (CIP) is not only required under the North American Electric Reliability Corporation (NERC) compliance standards,...
Windows Exploits, Cyberweapons, and You
Windows Exploits, Cyberweapons, and You
As we previously discussed in six signs of a data breach in progress, many organizations are not aware of an attack until after it has occurred....