Resources

Blog

What is Ransomware-as-a-Service (RaaS)?

What is Ransomware-as-a-Service (RaaS)? Ransomware-as-a-Service (RaaS) is a new pay-for-use business model used by ransomware developers where malicious actors (known as affiliates) can outsource or lease already-developed ransomware attacks the same way legitimate software developers lease Software-as-a-Service (SaaS) products. Because RaaS is a subscription-based model and all it takes is...
Blog

This Month in Cybersecurity: E-Reader Threats and More

In the last month, a lot has happened in the world of cybersecurity . Cyber threats are more numerous than ever before , which has brought both private sector and government organizations to take remediation actions seriously . Let’s break down some of the biggest stories of the last month. Israeli Cybersecurity Firm Check Point Uncovers Major Security Flaw Cybersecurity is an issue everywhere...
Blog

Best Practices to Share Large Files for Work

There are thousands of ways you could share large files , both with your colleagues or with friends and family: you can choose from half a dozen popular file storage and synchronization services, specialized one-time services, or even email. But there are some differences in best practices when it comes to personal versus work file sharing, and these only get more complicated when you factor in...
Blog

What is PGP Encryption and How to Use It

Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files . The Pros and Cons of PGP Encryption PGP, otherwise...
Blog

Ransomware Attacks on Small Businesses: How to Mitigate

More than fireworks exploded as Americans were prepping for Independence Day celebrations as hundreds of companies awoke on July 3 rd to yet another massive ransomware attack. This attack attempted to cripple the networks of up to 200 companies and up to 1,500 downstream businesses. All signs point to it being the handiwork of a ransomware organization most likely based out of Russia, REvil, whose...
Blog

This Month in Cybersecurity: Bolstering Defenses and Best Practices

Every day, cybersecurity becomes more important for businesses. Organizations have a need to protect their customer data and the number of attacks that businesses have experienced has increased. The bottom line is that cybersecurity news and best practices are important to pay attention to. Without further ado, let’s get into some of the latest news in cybersecurity as well as tips and tricks for...
Blog

What is PGP and How Does It Work?

When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up: Is the file complete? Is it being sent to the right place? Will it arrive intact? Is sensitive data protected and encrypted from unauthorized recipients? All are valid concerns, and each can be addressed with the help of encryption. By scrambling the data using one...
Blog

Who is Protecting Your Healthcare Records?

Patient Privacy is in Jeopardy: Data Breaches, High Payouts, and PHI How important is a patient's privacy? If your organization is a healthcare facility, the instinctive answer that comes to mind is "Very important!" After all, a patient's privacy is the basis upon which a doctor/patient relationship is based. Right? When it comes to patient data, the real answer may surprise you. While, of course...
Blog

The Biggest Cyber Risks Organizations Face Today

Today’s Biggest Cyber Risks When your organization handles sensitive data on a consistent basis, the looming threat of cyber risks is around every corner. Although cyber threats aren’t going anywhere anytime soon, the good news is that resources like cyber threat intelligence metrics can help with analyzing risks and understanding which evolving threats are relevant to your industry and geography...
Blog

Why Banking Growth in Latin America Correlates with Cybercrime

Bancarization is Exploding in Latin America Latin America is the fastest-growing banking market worldwide, and growth is only expected to continue. Forecasts are anticipating 10 percent increases across all Latin American banking sectors through 2022. Bancarization refers to both the amount of access and the degree of usage of financial services in a country or region. Both of these numbers have...
Blog

Top 12 File Transfer Frustrations

Sending and exchanging files is a vital daily task in most organizations. However, this responsibility to exchange information comes with some pretty common frustrations and risks unless the file transfer process is secure and managed appropriately. Here are a few of the biggest frustrations in file transfers and some solutions to help alleviate them. 1. Unreliable, Unsecure FTP File Transfers...
Blog

5 Topics You Should Know About in the World of Cybersecurity

Every year, organizations work hard to protect their data and analyze potential risks to it. However, as we’ve seen recently, the number of cybersecurity risks and data breaches has risen sharply. This makes it even more important to keep up with the newest cybersecurity guidelines and news so you can prepare your organization in the most effective way possible. To help keep you informed, here is...
Blog

Improve Your Big Data File Transfers: 11 Security Features to Consider

New challenges and new opportunities have arisen due to big data, which is altering the nature of file transfer technology. The Good News Big data is leading to new file sharing technology, which is making it easier to solve certain big data file transfer problems. On the other hand, it is increasing the bandwidth requirements companies face, including structuring systems to adhere to compliance...
Blog

PGP vs. Open PGP: What’s the Difference?

Encryption standards become more and more important every day. With the rise of data breaches , it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of encryption is the most effective way to make your data...
Blog

What is the Canadian Communication Security Establishment?

What is the CSE? The CSE is one of Canada’s key security and intelligence organizations, specializing in cryptology. CSE stands for Communications Security Establishment or Centre de la sécurité des télécommunications . As a cybersecurity leader in Canada, it has three main duties: Collecting foreign signals intelligence, aka intercepting communications to gather intelligence Protecting...
Blog

Data Security Best Practices Every CISO Should Know

Aligning Data Security with Organizational Strategy The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch. Whether data is grabbed in a headline-making breach of a well-known entity, or simple human error upends your operation, the...
Blog

Should You Use PGP or GPG Encryption?

Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or GPG for your encryption standard. What is PGP...
Blog

What is GPG?

What is GPG? GPG, also known as GNU Privacy Guard ( GnuPG ), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880 . GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative to Symantec’s software suite of encryption tools...
Blog

Encryption for Exchanging Files

You seal the envelope when you send a letter. You lock your car when you park at the big box store. You track your packages to make sure porch pirates don’t get them before you do. Your file exchanges should be no different. Learn the essentials on how you can keep your data secure both while it’s sitting at home or being delivered. What is Encryption and How Does it Work? Encryption is a method...
Blog

What is Safer Internet Day?

Safety First: It’s Safer Internet Day! Each February, more than 100 countries around the world take note of the massive power of the internet and more importantly, the urgency surrounding how to be safer and better users of the internet, especially those younger users. In the U.S., Safer Internet Day is recognized on Feb. 9. Why Was Safer Internet Day Started? The initiative began in 2004 as part...