Blog

Blog

Data Security Policy Template: Tips & Free Download

A data security policy is an organization's set of guidelines and rules for managing and protecting its data assets. Learn what goes into a data security policy, how to implement one, and best practices in this new blog.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Managing the Rising Tide of CVEs 

If you are watching recent security stats, you’ll likely spot an alarming trend. Common Vulnerabilities and Exposures (CVEs) are on the rise and expected to increase by 25% in 2024, reaching 2,900 CVEs per month¹. It’s not a huge surprise that the number of known vulnerabilities is growing, given the proliferation of systems and software. Unfortunately, average time to remediation is increasing...
Blog

3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Blog

What Is Data Management? Strategies & Best Practices

Organizations must collect and manage data effectively to remain competitive in today’s digital world. Data management is a vital area of enterprise management, with good practices necessary for regulatory compliance, business intelligence, and competitive advantage.What Is Data Management?Data management refers to the process of collecting, storing, organizing, and using data efficiently,...
Blog

3 Key Takeaways from AWS re:Inforce 2024

Every year, AWS re:Inforce brings together cloud security specialists and AWS experts alike to see and advance what’s new on the cloud security horizon. Fortra’s Mike Reed, Director of Global Alliances, walks us through what he saw on the ground floor as he covers several of this year’s key highlights.
Blog

Patch Tuesday Update July 2024

The first thing that everyone’s going to talk about this month is SQL Server. More than a quarter of the CVEs assigned by Microsoft this month describe SQL Server vulnerabilities. Thankfully, none of them are critical based on their CVSS scores and they’re all listed as “Exploitation Less Likely.”
Vulnerability Research

Patch Tuesday Update - July 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.46.0 and FVM Agent 2.9 releases.Microsoft addressed 142 vulnerabilities in this release, including 5 rated as critical, and 59 remote code execution vulnerabilities.This release represents a huge increase in the number of CVEs, as opposed to last month’s count.Notable Vulnerabilities from this patch Tuesday release:CVE-2024...
Blog

What Is Data Privacy? Top Risks & Best Practices

Data privacy, or information privacy, concerns IT's aspect involving control over data sharing by individuals or organizations. Read this post to learn more about why data privacy is important, along with best practices to strengthen data privacy.
Blog

What Is a Data Spill? How to Prevent and Manage It

A data spill or breach occurs when sensitive information is mistakenly disclosed or transferred to unsecured environments or unauthorized persons. Learn more about data spills, including how to prevent one, in this blog.
Blog

Four Key Cybersecurity Highlights from Infosecurity Europe

Infosecurity Europe 2024 saw a tightened focus on this year’s real security agenda: a holistic approach to data protection, scrutiny on the supply chain, and the ever-wary eye toward AI and its many uses. Fortra’s Steve Audsley, EMEA Solution Engineering Manager for Data Protection, shares his experience.