Cimcor Blog

Windows Exploits, Cyberweapons, and You
Windows Exploits, Cyberweapons, and You
  As we previously discussed in six signs of a data breach in progress, many organizations are not aware of an attack until after it has occurred....
Point of Sale Systems: Still at Risk for a Security Breach?
 
Information Security Architecture: Why You Need To Review
Information Security Architecture: Why You Need To Review
 Cybersecurity and information security for an organization is top of mind for many. However, the process of how to "catch up" or stay on top of the...
The ATM turns 50 but Malware Keeps Getting Younger
The ATM turns 50 but Malware Keeps Getting Younger
In 1967 the ATM was born, and the cash-dispensing revolution began. Though the spread of ATM usage was more prevalent in the 1980's within the U.S.,...
File Integrity Monitoring vs. File Activity Monitoring: Which is Best?
File Integrity Monitoring vs. File Activity Monitoring: Which is Best?
2016 was a tumultuous year for information security. Symantec's 2016 Internet Security Threat Report revealed some shocking stats about criminal...
7 Key Findings from Kaspersky's Cyber Security Index
7 Key Findings from Kaspersky's Cyber Security Index
Security professionals know users are among the greatest security risks to an enterprise. Human mistakes, negligence, or criminal intent among...
How to Detect and Stop a POS Breach Before it Happens
How to Detect and Stop a POS Breach Before it Happens
While the holiday shopping season may be over, there's a strong chance that another wave of point-of-sale (POS) system attacks against retailers,...
The 7 Scariest BYOD Security Risks (and How to Mitigate Them!)
The 7 Scariest BYOD Security Risks (and How to Mitigate Them!)
Bring-your-own-device (BYOD) programs experienced significant popularity in 2016. LinkedIn's Information Security Group, and Crowd Research Partner's...
The 6 Most Common Network Vulnerabilities Haunting CSOs in 2017
The 6 Most Common Network Vulnerabilities Haunting CSOs in 2017
Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage,...
5 Network Security Best Practices You Need to Implement in 2017
5 Network Security Best Practices You Need to Implement in 2017
The network security landscape is always changing. New threats are constantly appearing on the horizon. Cybercriminals are becoming more effective at...