Knowledge

Articles by tag "breach"

11/25/2020 Compliance

Ask Our VP of Compliance: November 2020

1/16/2019 Case Studies

Digital Edge Case Study: Cybersecurity Incident Response

Digital Edge team was tasked to help contain and eradicate a virus outbreak. A response team was gathered and after the initial kick-off call, the team started cleaning/investigation activities.

12/7/2018 Newsletters

Marriott International Loses Half a Billion Records to Hackers

Marriott International, a large American hotel chain, recently has had one of the largest breaches in history. This breach may have been prevented with a proper implementation of a cybersecurity system. Cybersecurity defenses protect against major attacks, ensuring no data loss. Implementing a cybersecurity system isn’t free, but the price of handling an attack is much greater.

10/24/2018 Newsletters

Content From Your Email is Being Cached

You have your corporate email defenses lined up. While you may be using an out of the box product such as Microsoft O365 or something more sophisticated like ProofPoint – here is what you need to know.

Although you might be as safe and secure as possible you should still be aware of the vulnerablities that exist and can affect you.  

Unless users are restricted from using mobile email apps, there is nothing that can protect you. This risk extends even to disclosure of your corporate authentication. 

Click here to read about this potential threat.

9/7/2018 Newsletters

Why Cyber Security Insurers Deny Your Incident Claims

You might’ve configured your email logging system incorrectly. How would you know until you got hacked? It’s fine -  you have cyber security insurance that will cover you right? WRONG. Recently, an undisclosed client experienced a major breach and was denied of their claim. Having cybersecurity insurance doesn't guarantee the safety net you might think it does -  not unless you meet the basic security guidelines.  Digital Edge’s Cybersecurity and Compliance experts are available to help you meet these standards in addition to protecting your infrastructure.