News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The most dangerous attack method: social engineering
The most dangerous attack method: social engineering

According to Verizon's Data Breach Investigations Report, 74% of security breaches are the result of successful social engineering attacks, bugs, abuse, and other human weaknesses. Also in many companies. A little good news: In the previous year, 82 percent of security breaches were recorded. But 74 percent remain social engineering attacks, according to Verizon's Data Breach Investigations report. The most successful attack method with 50 percent is pretexting, i.e. a social engineering activity with a specific pretext as the trigger. This is a double increase compared to last year. Phishing, phishing, phishing pretexting is...

Read more

Incident Response: The Optimal Emergency Response Plan 

In recent years, IT and security teams have faced various developments. Mass adoption of the cloud, increasingly sophisticated attacks, the shift to working from home, and other factors have created a changing environment. As a result, an incident response plan or emergency response plan from a few years ago no longer meets current requirements. No company wants to be reactive in the event of a security incident. A proactive approach with a solid IR plan helps organizations respond quickly and effectively and resume normal operations as quickly as possible. Many…

Read more