The Dataprise Blog

CEO Advice: How to Prepare for your Next Cyber Attack

Jul 27, 2021 BY DATAPRISE
Want the latest IT insights? SUBSCRIBE

A Little Cyber Hygiene Stops Big Problems

There are consistent steps your organization can take to prevent cyberattacks on your business. Learn what they are in this blog.
Information Security

Apple NSO Zero-Click Zero-Day: Dataprise Defense Digest

Citizen Lab discovered a zero-day zero-click exploit against Apple’s iMessage. Dubbed FORCEDENTRY, it’s a zero-day exploit that targets Apple’s image rendering library, and is effective against Apple iOS, MacOS and WatchOS devices. They’ve attributed the exploit to the Israeli cyber mercenary group, NSO Group, that is responsible for creating the Pegasus spyware used in numerous high profile exploitations of celebrity, politician, and world leader mobile devices.
Information Security

4 Common Cyber Insurance Coverage Exclusions & How Cyber Policies Can Close the Gaps

Cyber insurance is a must for companies today, but not all policies are created equal. Click here to learn more about the growing list of cybersecurity insurance coverage exclusions and what it means for your cyber protection.
Information Security

Microsoft MSHTML Remote Code Execution Vulnerability: Dataprise Defense Digest

A new vulnerability in MSHTML (Part of MS Office) is being actively exploited by malicious actors. This can enable malware execution through the MSHTML “web engine” functionality present in Office applications. The simplicity of opening a specially crafted MS Office document makes it ideal bait for phishing and spear-phishing attempts.
Information Security

User Credential Leak from 2019 Fortinet SSL-VPN Vulnerability: Dataprise Defense Digest

In 2019, FortiGate firewalls had a zero-day vulnerability that was exploited globally, allowing attackers to harvest user VPN credentials, usernames and passwords, remotely. This vulnerability has been addressed and patched by Fortinet in 2019, however, recently, a database of more than 87,000 FortiGate SSL VPN credentials harvested in 2019 has been leaked to the Internet. Researchers have noted that while some of the credentials will no longer work, there are some that still do.
Information Security

Here’s Why You Can’t Ignore T-Mobile’s Data Breach

On August 17, 2021, T-Mobile learned that a bad actor illegally accessed personal data and stole data on 50 million customers. Click here to learn why this breach is significant and learn which steps to take to prevent a data breach at your own organization.
Information Security

Why You Need Zero Trust Architecture in the Hybrid Workplace

Zero Trust Architecture is an end-to-end security strategy that provides your business with the ability to protect your most important data because you control access to it. Click here to learn the reasons why an organization should get started with implementing a Zero Trust architecture, and how it can go about doing so.
Information Security

Google Chrome Vulnerability (CVE-2021-30563): Dataprise Defense Digest

Google has issued a warning regarding a serious vulnerability in their Chrome browser (affecting Windows, Mac, and Linux) that could potentially allow a malicious actor to take full control over a machine. Google urges users to update their browsers immediately. Currently it’s estimated that about 2 billion Chrome browser installs are vulnerable.
Information Security

T-Mobile & AT&T Breaches: Dataprise Defense Digest

Two of the biggest wireless carriers in the US have been breached, resulting in millions of records of customer information being stolen and sold on the dark web. Besides the latent threat of identity theft, the repercussions of how this data could be misused could be disastrous on both a personal and a corporate level.
Information Security

Women in Technology: Meet Annie

This month's Women in Technology story features Annie Park, Analyst, Financial Planning and Analysis at Dataprise. Click here to learn more.
Talent Acquisition
Follow Dataprise
Want the latest IT insights? SUBSCRIBE