California Oil Spill
Late last week on Friday, October 1st, a major oil spill occurred off the coast of Southern California. An estimated 126,000 gallons of oil had spread across 13 square miles of the Pacific Ocean,...
View ArticleRiskWatch Product Breakdown
RiskWatch Introduction Thank you for taking the time to read about RiskWatch! Every so often, for the sake of clarity, we like to post a recap of who we are and the products we offer. Since 1993 we’ve...
View ArticleAwareness of Third-party Risks
Third-party risk is quickly becoming a primary concern for many organizations as the utilization of outside resources continues to increase. These organizations are operating in a complex ecosystem...
View ArticleNetwork Breach Awareness
A network breach, also referred to as network intrusion, refers to a cyberattack or unauthorized activity on your organization’s digital network. This breach typically jeopardizes network security and...
View ArticleSpear Phishing
What is Spear Phishing? Spear phishing is a means of electronic communication, most commonly via email, that is targeted to a specific individual or business in an attempt to steal private information...
View ArticleFileless Malware Risk
What is Fileless Malware? Fileless malware is a type of malicious software that utilizes legitimate programs, rather than virus-laden files, to infect a host. These legitimate programs are used to...
View ArticleMan-in-the-Middle Attack
What is a Man-in-the Middle Attack? A man-in-the-middle (MITM) attack is a type of cyberattack in which a cybercriminal secretly intercepts communication between two parties, therefore being “in the...
View ArticleDenial of Service Attacks
What are Denial of Service Attacks? Denial of Service (DoS) Attacks are meant to shut down a network, making it inaccessible to intended users. Often, systems are shut down due to malicious traffic...
View ArticleRisks Every Real Estate Business Should Guard Against
While there are many great opportunities provided for real estate businesses, there are also certain risks that should be protected against. A real estate business depends entirely on its agents and...
View ArticleCyber Risk Assessments
Cyber Risk Assessments Risk assessments are crucial to any organization’s risk management strategy. A cyber risk assessment functions to identify information assets that could be impacted by a...
View Article
More Pages to Explore .....