Cimcor Blog

Global Costs of Cybercrime in 2017
Global Costs of Cybercrime in 2017
 
5 Cybersecurity Tips to Improve Employee Habits
  Employees are a first-line defense against threats such as zero-day attacks and breaches. It is critical that they are made aware of basic methods...
Key Features to Look for in File Integrity Monitoring Software
Key Features to Look for in File Integrity Monitoring Software
An organization's  IT infrastructure monitoring needs to provide alerts for unplanned downtime and network intrusion,  as well as secure the systems...
Peyta Raises the Stakes for Businesses
Peyta Raises the Stakes for Businesses
  Last month it was AdylKuzz. Last week was Peyta/NotPeyta. How will next month's malware evolve? With each season, organizations can expect a new...
4 Things You Should Know about Your Information Security Architecture
4 Things You Should Know about Your Information Security Architecture
Business information is seemingly at a constant state of risk. Last week’s massive global cyberattack proved just how vulnerable many organizations...
How Host-Based Intrusion Detection System (HIDS) Works
How Host-Based Intrusion Detection System (HIDS) Works
With cyber attacks and hacking all over the news, building up your own company’s security may be on your mind. We know today that a firewall is not...
3 Ways to Mitigate the Human Factors of Cyber Security
3 Ways to Mitigate the Human Factors of Cyber Security
Before diving into how to mitigate the human factors of cyber security, perhaps it is best to understand what the term actually represents. The human...
Windows Exploits, Cyberweapons, and You
Windows Exploits, Cyberweapons, and You
As we previously discussed in six signs of a data breach in progress, many organizations are not aware of an attack until after it has occurred....
Information Security Architecture: Why You Need To Review
Information Security Architecture: Why You Need To Review
 Cybersecurity and information security for an organization is top of mind for many. However, the process of how to "catch up" or stay on top of the...
7 Key Findings from Kaspersky's Cyber Security Index
7 Key Findings from Kaspersky's Cyber Security Index
Security professionals know users are among the greatest security risks to an enterprise. Human mistakes, negligence, or criminal intent among...