Cimcor Blog

Five Industries in Greatest Danger of a Data Breach
Five Industries in Greatest Danger of a Data Breach
A decade ago, many organizations might not have considered a data breach as something to cause worry. Now, the potential compromise of sensitive data...
How to Stop a DDoS Attack Before It Can Disrupt Your Business
How to Stop a DDoS Attack Before It Can Disrupt Your Business
Distributed denial of service attacks (DDoS) are growing in size and frequency. Arbor Networks research has found that there is an average of 124,000...
How Much Do Healthcare Information Security Failures Really Cost?
How Much Do Healthcare Information Security Failures Really Cost?
Over the past two years, data breaches have cost the U.S. healthcare industry over $6.2 billion dollars, according to the Ponemon Institute's Sixth...
7 Real Reasons Big Brands Suffered a Massive Data Breach
7 Real Reasons Big Brands Suffered a Massive Data Breach
In any given month, thousands of organizations worldwide may suffer a data breach. A study sponsored by the UK government estimates 65% of large...
7 Common File Integrity Monitoring Software Configuration Mistakes
7 Common File Integrity Monitoring Software Configuration Mistakes
Your organization's ability to make data-driven decisions about information security is only as good as your data. If your security objectives...
Real-Time Change Detection vs. Polling: Which Is Best?
Real-Time Change Detection vs. Polling: Which Is Best?
Ninety-one percent of global organizations have adopted a risk-based security framework, according to Pricewaterhouse Cooper (PwC) research. For some...
Identifying Suspicious Network Changes: 8 Red Flags to Watch For
Identifying Suspicious Network Changes: 8 Red Flags to Watch For
It takes most organization six months or longer to detect a data breach. Early detection can be critical to ensuring an incident doesn't become a...
Can File Integrity Monitoring Catch Internal Threats?
Can File Integrity Monitoring Catch Internal Threats?
One of your greatest information security risks is likely your employees—especially administrative users. Data from the 2016 Verizon Data Breach...
6 Warning Signs of a Data Breach in Progress
6 Warning Signs of a Data Breach in Progress
Every security professional's worst nightmare: Being informed by law enforcement or another third-party entity you have suffered a data breach....
10 Smart Ways to Mitigate Overlooked Network Security Risks
10 Smart Ways to Mitigate Overlooked Network Security Risks
The vast majority of information security incidents aren't caused by highly-sophisticated, unprecedented technological exploitation. In fact, the...