Search
Close this search box.

Category: Blog

Exciting New Way to Authenticate on Android 7 phones & Resilient is Ready!

Resilient Network Systems believes FIDO2/WebAuthN has the potential to dramatically improve the security and privacy of identity on the web, while dramatically simplifying the user’s task of registering and authenticating their identity.  WebAuthN became an official WC3 Standard today, March 4, 2019, and FIDO2 is achieving broad industry endorsement and support

Compliant Productivity: Embracing “Millennial” Communication Tools While Maintaining Compliance

From employee communication apps like Slack to personal text messages, today’s organizations rely on modern tech for all aspects of their workplace productivity. This shift in how businesses communicate requires a shift in how businesses achieve compliant productivity. More than 40% of Fortune 100 companies today use Slack for internal collaboration and communication. Within these companies, dozens

Ransomware Overshadowed by Phishing, But It’s Not Dead Yet

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a single ransomware out there to capture the collective imagination like Locky did in 2016, but don’t be misled—ransomware continues alive and well. Recent targeted Ryuk

Ransomware von Phishing übertroffen, aber noch nicht ganz ausgemerzt

Mehreren jüngsten Umfragen zufolge hat Phishing Ransomware als größtes Sicherheitsproblem für IT- und Sicherheitsmanager übertroffen. Keine einzige Ransomware steht so im kollektiven Bewusstsein wie Locky im Jahr 2016. Aber lassen Sie sich nicht täuschen: Ransomware geht es weiterhin allzu gut. Jüngste zielgerichtete Ryuk-Angriffe haben Unternehmen verstärkt ins Visier genommen, wie

Data Classification Fail: Data Stolen at Apple Car

Confidentiality Oaths and Stolen Secrets As Bloomberg first reported, an Apple Inc. engineer has been charged with stealing data from the company that contained car secrets for a prototype driverless car. Jizhong Chen had been working for Apple for about six months, signing a strict confidentiality oath upon being hired.  According to another Apple

Buying Email Security for Office 365 Has Gotten Harder

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email security? New Buyer’s Guides give a framework and provide a checklist to get it right. Over the last few years, the way businesses use technology has undergone a complete transformation, driven by two major trends

Opt-In or Opt-Out: Which Route Should Your Organization Go?

The General Data Protection Act (GDPR) launched a worldwide conversation on data security and consumer data protections. As historical data breaches continue to happen on a way-too-frequent basis, and data privacy legislation expands across the globe, companies are taking a harder look at their privacy policies and their obligations under each

CCPA Readiness Checklist: Are You Protected?

he California Consumer Privacy Act of 2018 (CCPA) becomes effective January 1, 2020, but organizations must have certain data protection policies in place now to comply with the new legislation. Modifications to current procedures and a solid understanding of legal requirements are essential to CCPA compliance.    The CCPA increases

GDPR in 2019: We’ve Only Just Begun

E-mails, pop-ups, and opt-out messages flooded inboxes and browsers in 2018 as companies began to worry about consent governance and privacy regulation – and the business impact of non-compliance. The General Data Protection Act brought awareness and attention to data privacy across the world. When GDPR went into effect in

How to Protect Your Office 365 Email Users from Phishing

Phishing emails targeting Office 365 customers are the top source of security breaches, according to survey data. In case you missed it, in 2018 phishing officially the top concern for IT and security managers who have deployed Office 365 at their companies, having eked past ransomware according to a cybersecurity