How mid-market companies can out-smart cybersecurity misinformation

Dror Liwer Blog

As we discussed previously, cyberattacks against small businesses are on the rise. Mid-market companies are falling victim to data theft, phishing, malware, and ransomware attacks at an alarming rate. Luckily, there are ways for these companies to improve their cybersecurity. Below are the questions that mid-market companies need to ask when evaluating vendors: What is the true Total Cost of …

Cybersecurity misinformation targeting mid-market companies

Dror Liwer Blog

Cyberattacks against small businesses are on the rise. Mid-market companies are falling victim to data theft, phishing, malware, and ransomware attacks at an alarming rate. According to a special report by Cisco, 53% of mid-market companies have experienced a data breach, with more than half of those attacks resulting in more than $500,000 worth of damages. That’s enough to put …

Why mid-market cyberattacks could prompt next recession

Josh Klasco Blog

Mid-market cyberattacks could have devastating consequences for our economy. This makes sense, considering mid-market companies are the backbone of our country. As such, if there is stability is compromised, we all go down with them. What do you need to know about the effects of mid-market cyber-attacks? How can we keep our companies safe? What do the world’s leading cybersecurity …

Data Risk Management

Professional services and customer data risk

Dror Liwer Blog

The professional services sector is a particularly tempting target for cybercriminals. Accounting, legal, financial, IT, and insurance firms possess large databases of confidential and sensitive information that can fetch top dollar on the black market. Sensitive data may include: Client banking information Healthcare records Trade secrets Intellectual property Highly classified documents This information is highly valuable to criminals who want …

cyberthreat collateral damage

When it comes to cyberattacks, the mid-market is often collateral damage

Dror Liwer Blog

How can small businesses protect their assets from becoming collateral damage in a cyberattack? Large enterprises and international corporations are shining targets for hackers. From industrial espionage to ransomware, data theft is an obvious jackpot for malicious parties. We pay plenty of attention to enterprise threats and risk management. But we need to speak up about about the risks to …

Cyberthreats for the rest of 2022

Cyberthreats for the rest of 2022

Dror Liwer Blog

Since the start of 2020, a cyber-warfare storm has been brewing. Hundreds of thousands of mid-sized businesses lie in its path. Cyberthreats are common occurrences. In fact, they’re so common that every company falls into one of two categories: Companies that have already suffered a security breach. Companies that are about to suffer a security breach. How do we know? …

Airport cybersecurity

Dror Liwer Blog

Airport cybersecurity is crucial for guarding our personal data – not to mention our lives. But the aviation industry rarely meets basic security standards. When it comes to protecting its cyber systems from attack, they’ve dropped the ball. In 2020, Swiss researchers identified “massive cybersecurity risks” at 97 of the world’s top 100 airports. Actually, only three of the world’s …

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why.

Dror Liwer Blog

Do Hidden SSIDs Work? The logic makes sense: If it can’t be seen, it can’t be attacked. But that logic doesn’t always work with wireless SSID. Many businesses and individuals hide their SSIDs (known fully as a Service Set Identifier) with the hope of eluding hackers. A prevailing theory in security has long held that by cloaking an SSID, hackers …

Retail SMBs and Payment Data Risks

Dror Liwer Blog

Cyber-attackers continue to use creative methods of exploiting vulnerabilities. They’ve turned their attention to the manufacturing and retail sectors, using mobile apps and cloud technology to their own advantage. Proper security requires more than stronger passwords or releasing a memo to personnel regarding known email phishing attempts. Modern threats require forward-thinking solutions and a wide net of tools to mitigate …