Sungard AS Blog | //CYBER SECURITY

3 tips to prevent remote workers from falling victim to phishing attacks

The surge in phishing attacks related to COVID-19 is staggering.  Barracuda Networks announced a 667% spike in coronavirus-related phishing messages in March compared to...

How to plan for a natural disaster during a pandemic

Annual hurricane season forecasts are here, and the news is less than ideal. Colorado State University’s forecast predicts "above normal" activity for the 2020 season....

Disaster Recovery Security: How to Secure Your Organization as You Recover

The most resilient organizations proactively address emerging threats, prioritize cybersecurity and have a plan in place to quickly mitigate vulnerabilities. ...

Cybersecurity Basics: How Local Governments Can Avoid Ransomware Attacks

Baltimore has already spent $18.2 million in recovery and other costs after a ransomware attack in May. A school district in upstate New York recently delayed...

Container Security Cartoon: What’s in Your Containers?

  If you’re using container technologies, ask yourself this: Do you actually know what’s inside your containers? Do they contain any malicious software libraries? Are...

How to Combat Data Breach Fatigue at Your Enterprise

Since 2005, 8,983 data breaches have been made public in the U.S, according to the Privacy Rights Clearinghouse. That works out to 1.69 breaches a day, with 11.5...

Does having cyber insurance make your business more resilient?

By Asher de Metz When you read about the legal battle between food manufacturer Mondelez and its insurer, Zurich American Insurance, it really makes you stop and...

Small Businesses: A Goldmine for Hackers

By Sungard AS News reports of cyber-attacks tend to focus on corporate giants and high-profile brands. But a worrying trend is emerging among small businesses, which...

Creating a Cyber Security Incident Response Plan

By Sungard AS The number, sophistication and severity of cyber attacks is increasing, and any business handling customer data, which can be easily monetized, is a top...

5 Steps to Assess and Mitigate Cyber Security Risks

By Sungard AS As multinational enterprises put more resources into security and breach prevention, criminals are increasingly diverting their activity towards smaller...

The Consequences of a Cyber Security Breach

By Sungard AS 2016 saw a marked upturn in the volume and creativity of hacks and mega breaches, with LinkedIn, Tumblr, Yahoo, AdultFriendFinder, Three Mobile, and...

Could Legacy IT Sink Your Ship?

By Sungard AS It was discovered last year that many maritime vessels were under significant threat of cyber breaches because they were using outdated software. Tankers...
x

SUBSCRIBE TO OUR BLOG

Advice, stories, and expertise about work life today.

x

THANK YOU!

We know your inbox is protected space, so we promise to send only the good stuff, twice a month.