Category: Blog

Do You Know the New PII Rights under GDPR?

Do You Know the New PII Rights under GDPR? What is your current address? What was the yearly salary of your last position? What is your Social Security (national insurance) number? Consider how many PII (personally identifiable information) questions your organization asks for background checks of individuals being vetted as

New Scarab Ransomware Using Necurs-as-a-Service

13.3 million Scarab ransomware emails detected in one day The new Scarab ransomware being distributed via email by the Necurs botnet appears to come from scanning devices or services like HP, Epson or Lexmark. While there are similarities to the Necurs-distributed Locky ransomware, Scarab seems to have been developed by

FileFacets in MicroScope Article: GDPR influencing channel relationships

FileFacets in MicroScope Article: GDPR influencing channel relationships MicroScope recently wrote on how looming GDPR regulations mean resellers are starting to ensure they have a complete data protection solution, mentioning our recent partnership announcement with Nuvias.Read the full article here.

10 Cyber Threat Terms Every IT Manager Should Know

Do you know the difference between spear phishing and clone phishing and…just plain phishing? Or adware and malvertising? Check out the list below of the top 10 threat terms every employee should be familiar with, and familiarize yourself with more threat terms in Cyren’s new online Cyber Threat Dictionary in

FileFacets Appoints Nuvias as EMEA Cyber Security Distributor

OTTAWA, Nov. 22, 2017 /CNW/ – FileFacets, a privacy compliance and enterprise analytics company, today announces the appointment of European IT distributor Nuvias as its sole cyber security distributor in EMEA. Through the partnership, FileFacets aims to drive international expansion and meet growing demand for its Enterprise ID data discovery products. FileFacets Enterprise

How Do You Know Your Email Security Is Working?

When was the last time you assessed the effectiveness of your email security? Email is the main vehicle for introducing malware into an organization, so it is imperative that you do so. Here at Cyren we know how eye-opening such an evaluation can be, because during September and October, we

Enterprise Analytics: Searching, Clustering, and Learning – Oh My!

Enterprise Analytics: Searching, Clustering, and Learning – Oh My! Have you ever put together a 1,000-piece puzzle without a picture to reference as you work? The task is time-consuming, frustrating, and seemingly impossible. After turning over each piece, you slowly begin to notice how the disparate shapes and images can

Fake Invoice Carries “Rescoms” Malware

Emails containing malicious attachments equipped with keyloggers and screen capture capabilities are targeting businesses worldwide, with noted attacks in Asia, Russia, and the Middle East. The campaign is designed to look like it comes from real affiliates and employees working for a well-known pharmaceutical distributor in order to make the