One of best ways to stay safe, and maximize your time, is to prioritize your risk. Ben Carr, Qualys CISO, and Zane West, Proficio’s VP of Products and Development, chat about the benefits of solutions like Risk-Based Vulnerability Management and what’s key to better understanding your risk profile. This is critical when dealing with a hybrid workforce, but what else is essential? Learn what they recommend and also hear their tips on how to stay compliant in an increasingly challenging time.
One of the most popular buzzwords today is SOAR, Proficio’s EMEA SOC Director, Carlos Valderrama, and former Gartner Analyst, Oliver Rochford dive into the concept of SOAR in cybersecurity. Oliver provides his unique perspective of how the term came to be while he was working as an analyst at Gartner. Does he think SOAR lived up to its potential? Tune in to find out!
The conversation leads off with their ideas on what the SOC of the Future will look like; they also provide their insight into what aspects are critical for these to be successful. Carlos notes, “we see a lot of vendors push for buzzwords… instead of looking for real solutions.” So where will they go from there?
How are cybersecurity teams adjusting to the current threat landscape and what can they do to stay ahead? Hear what Proficio CEO and Co-Founder, Brad Taylor and VP of Solutions for ePlus, Lee Waskevich, had to say about this and other topics influencing todays cybersecurity industry.
With many cybersecurity teams facing resource constraints, Brad and Lee talk about some alternatives for those organizations. These include adding automation to augment staffing or using a risk-based approach to focus on your most critical vulnerabilities. What else do they suggest? Listen to find out!
How do you develop a mature cyber program? A question that many organizations struggle with. On this episode of Cyber Chats, Proficio’s Carl Adasa and Rick McElroy of Carbon Black discussion kicks off with possible answers to that question. Their experience both from the provider and vendor side gives them a unique perspective on how companies can build up a strong internal program.
With this goal in mind, they go on to address the challenges many teams face, with the lack of qualified cybersecurity professionals available to hire. This leads many organizations to outsourcing some or all of their security needs, which means finding the right partner is critical. So, what should you look for? And what can you do to help win the war on cybercrime? Tune in to find out.
May 5th, 2016 is World Password Day – a day created to encourage safe password practices. The best defense against external threats is staying informed and diligent with your security practices, especially when it comes to email security.
Here are some tips to help stay safe from email threats:
- Never share your password. If someone is requesting this information via email, they are phishing for access to your account. Understand that reputable businesses would never ask for personal information via email.
- Change your password often and create strong passwords – use a combination of letters (capital and lower case), numbers, and special characters that is at least eight characters long
- DO NOT open email attachments unless you know the sender, are expecting attachments from them, or can verify that the approved sender sent the attachment. If you receive an attachment you cannot verify, DELETE IT – it’s better to have someone have to resend the attachment.
- DO NOT reply to spam messages or emails that seems suspicious.
- Learn how to recognize phishing and spear phishing attacks. Some examples of frequently used techniques to steal your credentials are:
- Messages that contain threats to stop services or shut down your accounts
- Emails that request personal information (i.e. account numbers, PHI, credit card information, passwords, etc.)
- Emails that use words such as “Urgent” or Immediate Response Requested”. These words usually raise a sense of alarm, and make feel like a reply is warranted
- Forged email addresses. These are sometimes hard to notice as some email programs leave out email addresses in the body. If you are suspicious of messages in the body you can check the senders true Identity in the email headers
- Poor writing or grammar errors
- Be aware of links in email. Before clicking anything, verify the links are valid by hovering over link to see if the URL looks legitimate. You can also check links by typing them into virustotal.com or using Google search engine
- Be aware of where you are posting your personal information. Spammers tend to “troll” social media sites for information they can use to make their email seem legitimate or guess your password.
Just following these few tips will help to keep your email more secure and ensure your password protected information is safe.