Blog
How Did Ashley Madison Get Hacked?
By Cybersecurity Experts at Fortra on Tue, 08/25/2015
How did Ashley Madison get hacked? Take a look back and relive one of the biggest hacks of 2015, from the first data dump to the CEO resigning, with our updated timeline.
Blog
What is NIST Compliance? (Checklist, Definition, & More)
By Cybersecurity Experts at Fortra on Mon, 08/24/2015
NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high-tech industries today.
Blog
3 Ways to Protect Your Company Against USB Drops
Tue, 08/18/2015
Recently in Arstechnica.com there was an article bringing light to how Windows computers can be exploited when booby-trapped USB fobs are inserted into the machine that then executes malicious code.Microsoft has acknowledged this and released a security bulletin regarding the issue stating, “To exploit the vulnerability, an attacker would have insert a malicious USB device into a target system.”So...
Blog
DDoS as a Cover for Data Theft
By Cybersecurity Experts at Fortra on Tue, 08/11/2015
Distributed denial of service attacks are IT teams' worst nightmare - but they may be the least of your problems, experts say.
Blog
How to Protect Your Android Device from the Stagefright Vulnerability
By Cybersecurity Experts at Fortra on Tue, 08/04/2015
The Stagefright vulnerability puts millions of Android users at risks - learn how to protect your Android device from infected text messages.
Blog
Communicating the Data Security Risks of File Sharing & Cloud Storage
By Cybersecurity Experts at Fortra on Wed, 07/22/2015
We asked 34 data security experts how companies can best communicate the security risks associated with file sharing and cloud storage to employees - see what the experts had to say.
Blog
How to Watermark Any File with Digital Guardian Secure Collaboration
By Cybersecurity Experts at Fortra on Tue, 07/14/2015
Whether digital or physical, a watermark is an excellent tool for discouraging counterfeiting and establishing the ownership and veracity of a document.
Blog
ATF Official Caught Leaking Employee Data
By Cybersecurity Experts at Fortra on Tue, 06/30/2015
CNN reports that an executive at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) was sending personnel data to a personal email account.
Blog
What is Cloud Account Hijacking?
By Cybersecurity Experts at Fortra on Mon, 06/15/2015
Learn more about the risks of cloud account hijacking and methods to prevent sensitive data loss in the cloud.
Blog
Are Data Breaches Victimless Crimes?
By Cybersecurity Experts at Fortra on Thu, 06/11/2015
Home improvement giant Home Depot is asking a court to dismiss a class action lawsuit against it stemming from a massive theft of credit card numbers from its corporate network last year. The argument: no harm was done as a result of the breach.
Blog
5 Questions to Prepare for Your Next Security Audit
By Cybersecurity Experts at Fortra on Thu, 06/04/2015
Use these five questions to gauge your audit readiness and prepare to demonstrate your security posture to corporate clients.
Blog
BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
By Cybersecurity Experts at Fortra on Wed, 06/03/2015
30 data security experts discuss the best policies on BYOD and how to prevent a breach.
Blog
How to “Time-bomb” a Confidential File with Fortra Secure Collaboration
By Cybersecurity Experts at Fortra on Tue, 06/02/2015
Self-destructing messages are certainly attention grabbing, but there are many legitimate reasons to limit someone's ability to view or edit a file, by time, by usage, or even by role. We have customers today using this capability to manage job offers and term sheets that expire after a specific date. Some are even managing the lifecycle of business records and classified data types that must be destroyed after a certain number of days, weeks, or months.
Blog
What is an Advanced Persistent Threat?
By Cybersecurity Experts at Fortra on Mon, 06/01/2015
Learn about advanced persistent threats, including how they work and how to recognize signs of an APT attack.
Blog
What is a Phishing Attack? Defining and Identifying Different Types of Phishing Attacks
By Cybersecurity Experts at Fortra on Mon, 05/18/2015
Learn about the different types of phishing attacks as well as how to recognize and avoid falling victim to phishing scams in our series on the fundamentals of data protection.
Blog
Sally Beauty: When one Breach Begets Another
By Cybersecurity Experts at Fortra on Fri, 05/15/2015
The beauty supply store acknowledged today that it was the victim of yet another data breach – the second in as many years. But where does one incident end and another begin?
Blog
What is Device Control?
By Cybersecurity Experts at Fortra on Mon, 05/04/2015
Learn about device control technology and how to implement device control solutions in your security program.
Blog
Experts Discuss How to Protect Legal Clients' Confidential Data
By Cybersecurity Experts at Fortra on Wed, 04/29/2015
Data security is a critical part of doing business for law firms. We asked a group of lawyers what technology and processes they have in place to protect clients' sensitive information.
Blog
FCC, AT&T Reach $25M Settlement Over Insider Data Breach
By Cybersecurity Experts at Fortra on Tue, 04/28/2015
The FCC announced that AT&T Services has agreed to pay a $25 million civil penalty to resolve investigations into consumer privacy violations at AT&T call centers. In the incident, AT&T call center employees in Mexico, Columbia, and the Philippines accessed and disclosed customer records without authorization. These records revealed customer names and full or partial Social Security numbers for...