Monthly Archives: September 2017


Woman in a cafe having problems with the credit card  ++++NOTE for the inspector: Credit card is fake and is made especially for the photosession ++++

Protecting Your Organization From Phishing Schemes

It’s not just the bad actors that we at Core Security want to protect you from – we also want to protect you from yourself. It’s all hands on deck when it comes to securing your systems and the systems you interact with on a daily basis. Everyone personally has, on average, four devices to keep track of – all with different accounts (or even...

Read More


Image of two young businessmen discussing document in touchpad at meeting

The 4 Questions to Ask Your Security Consultants

While it can be nerve-wracking letting someone into a portion of your organization, look at it as though you are actually taking back control. Enlisting the help of trained and experienced experts is nothing to be ashamed of – if anything, this could be the smartest thing you do for your company. However, before completely letting go of the reigns here are some questions to...

Read More


2017 Latest: Hackers Get Smarter By Going “Old School”

2017 Latest: Hackers Get Smarter By Going “Old School”

There is some good news. Businesses, it seems, are getting ever-so-slightly quicker at actually spotting breaches: the average time between compromise and discovery has apparently gone down from 146 to 99 days. But of course, this is still more than adequate time for hackers to access what they are looking for. Those of us who have been involved in cyber security for decades are familiar...

Read More


Integrating Big Data Intelligence to Enable Breach Prevention

Integrating Big Data Intelligence to Enable Breach Prevention

Businesses are not prepared for advanced malware. This may seem like a harsh statement but as this week’s POS breach at Chipotle showed us, it is true. According to the 2017 Verizon Wireless Data Breach Report, over half (51%) of breaches included malware and 66% of that came through malicious email attachments. In the world of cyber security and cyber defense, there is uneven playing...

Read More


The New Role of Analytics in Identity and Access Management

The New Role of Analytics in Identity and Access Management

It’s amazing how much cyber-security has grown over the past few years. Where we were once worried about keystroke logging or Trojan horse attacks, we now face situations like ransomware and cyber warfare. User credentials are still the number one target for bad actors and as long as they find ways to steal them, they will continue to find ways into our network. Bad actors...

Read More


4 Bad Cyber-Security Habits

4 Bad Cyber-Security Habits

We hear about high-profile breaches almost every week in the news, but what actions are organizations taking to keep these breaches from happening? Implementing new solutions is great and new tools are always helpful, but it’s the bad habits formed by your team that can really hurt you. Here are 4 bad cyber-security habits to break immediately: 1. Increased “Awareness” Doesn’t Mean Increased “Enforcement” Telling...

Read More