Blog
Page 43 of 152
What is Endpoint Detection and Response (EDR)?
Your organization’s daily operations depend on connections: to your clients, vendors, staff, and other parties. In our era of the Internet of Things (IoT), this also means that every new piece of hardware connected to your network is another endpoint that needs to be secure. An endpoint is any device connected to your networks, such […]
May 12, 2023
Updated Fraud Risk Guidance Available
This article first appeared on RadicalCompliance May 4, 2023. Auditors and other anti-fraud professionals have fresh guidance this week on how to manage fraud risk, with an emphasis on data analytics, internal reporting hotlines, and discussion of how effective fraud risk management can deter fraudsters from trying their schemes in the first place. Said guidance […]
May 11, 2023
ATO Attacks: What You Should Know About Protection and Prevention
Among all the cyber attack techniques gaining prominence, account takeover (ATO) attacks are perhaps the most unnerving for businesses. Even though financial institutions seem like an obvious target, e-commerce storefronts and online entertainment platforms are also becoming popular targets. For example, online betting website DraftKings fell victim to an ATO attack in 2022, where the […]
May 10, 2023
Page 43 of 152