Hot Topics at IT Nation Secure 2024
| |

Hot Topics at IT Nation Secure 2024

I’m back from last week’s IT Nation Secure conference, and I want to share just a few of my takeaways from the sessions: Hacking is bad and getting worse AI is growing, and companies aren’t prepared Most professional businesses aren’t ready for security regulations Hacking Stats Bad actors are stepping up their attacks, even as…

Unleashing the Power of AI in Your Business: A Journey of Discovery
| | |

Unleashing the Power of AI in Your Business: A Journey of Discovery

By Maurice Unglik, Sagacent’s Client Success Manager Hey everyone! I recently wrapped up an incredible 6-week online course focused on applying AI solutions to business clients across various industries, and I couldn’t be more excited to share what I’ve learned. AI, or artificial intelligence, isn’t just a buzzword, and it isn’t limited to just ChatGPT;…

Connected Devices Can Jeopardize Your Business Security
| |

Connected Devices Can Jeopardize Your Business Security

The Internet of Things (IoT) isn’t just a futuristic vision from science fiction movies. It’s already woven into the fabric of our daily lives, silently sending and collecting data to and from everyday objects all around us. While executives might readily associate IoT cybersecurity risks with networked printers, manufacturing equipment, and perhaps cloud services; another…

Why Are There So Many Account Takeovers of Social Media Accounts?
| |

Why Are There So Many Account Takeovers of Social Media Accounts?

Social media account takeovers are a serious problem, and their prevalence is only increasing. In 2022, the Identity Theft Resource Center (ITRC)1 received four times the number of inquiries about social media account takeovers compared to 2021. There are a number of reasons why social media accounts are so frequently targeted by scammers. First, social…

Zero-Trust Security Model for Confident and Secure Businesses
| | |

Zero-Trust Security Model for Confident and Secure Businesses

The Zero Trust security model is a way to deal with the problem of perimeterless security in an age of remote working and cloud networks. In this blog post, we discuss the meaning and importance of the Zero Trust security model for Small and Medium Businesses, from basic principles to business examples.

Social Engineering Hacking—Attack Types and Examples
| | |

Social Engineering Hacking—Attack Types and Examples

Security tactics such as IT audits, pentesting, vulnerability scanning, reports and alerts are highly sophisticated. Yet, social engineering hacking is able to circumvent this technology by ‘hacking’ our brain instead—taking advantage of our trust, fear, politeness, or inattention. This specific type of hacking may be supported by technology; but the catalyst is psychological exploitation.

FTC Safeguards Rule—Compliance Audits for Financial Institutions
| | |

FTC Safeguards Rule—Compliance Audits for Financial Institutions

What does the FTC Safeguards Rule require of financial institutions? Does it apply to you? What should a compliance audit look like and who should conduct it? This blog post answers your burning questions on the latest updates to the FTC rule.

Best IT security practices for working from home
| | | |

Best IT security practices for working from home

I’m one of those fortunate people whose company supports a hybrid work environment. This means that I generally work from home, but can actually work from anywhere (in the office, at home, and on the go). On a typical day, I’m in my home office—where I have access to my company’s network and all the…