Steps to Improve Cybersecurity as Your Employees Return to the Workplace
January 13, 2021

Steps to Improve Cybersecurity as Your Employees Return to the Workplace

It is likely that after working remotely for over a year, companies around the world will soon expect their employees to return to the office.

Is Your Remote Working Security Checklist Effective?
December 14, 2020

Is Your Remote Working Security Checklist Effective?

After struggling for almost a year, things are finally getting back to normal. Not in the way they were before, but after being under lockdown for so long, people are adapting to this new normal.

The Growing Importance of Endpoint Security
December 07, 2020

The Growing Importance of Endpoint Security

What to make of this world driven by technology- is it a benefit or a problem for society? The truth is - both.

Why USB Policy Matters
September 28, 2020

Why USB Policy Matters

Honeywell released a report that over 40% of USB portable storage devices contain at least one risky file and over 25% of those threats could lead to operational issues. In 2018, IBM’s chief information security officer, Shamla Naidoo, released a statement focused on digital hygiene and IBM’s steps towards banning portable storage devices, including USBs. Similarly, the French National Assembly has worked to raise cybersecurity awareness with a similar aim to ban USB sticks during their meetings. With companies, and even countries, working to ban the use of USBs, it can be difficult for enterprises to know what decision they should make when it comes to USB policy. One way or another, enterprises need to address the issue and strictly enforce these policies to avoid catastrophic breaches. Recent security breaches and mishaps with USBs should serve as a warning to enterprises still using them freely and without restrictions.

Key Cybersecurity Considerations When Onboarding New Employees
September 14, 2020

Key Cybersecurity Considerations When Onboarding New Employees

It’s a common misconception that the only threats to an enterprise’s security come from external actors. Whether intentional or not, 47% of organizational data breaches are the result of internal human error, such as a misplaced device or document. Moreover, some employees present an even larger risk than others. According to recent reports, younger employees are more likely to bypass security protocols that are viewed as an impediment to their productivity. When it comes to onboarding new employees, young or old, enterprises must have proper security awareness & anti-phishing training, in addition to a strong privileged access management solution, to guard against the different types of human error that could create security vulnerabilities.

Why Mobile Application Security is Necessary for Every Business
August 31, 2020

Why Mobile Application Security is Necessary for Every Business

Mobile applications are becoming an increasingly vulnerable gateway for hackers to steal information from users and businesses alike. From accessing microphones and cameras to finding the location of a user’s device, mobile applications offer hackers access to the personal information of unsuspecting users. Recent reports have shown that over 25 million Android phones are vulnerable to attack via installed applications. As hackers become savvier, the number of mobile application attacks will continue to increase drastically. By implementing proper mobile application security and mobile application vulnerability testing procedures, enterprises can remain safe even as attacks rise.

Penetration Testing 101
August 17, 2020

Penetration Testing 101

Knowing an enterprise’s weaknesses is just as important as knowing its strengths. Penetration testing is the process of auditing a computer system, network or web application to uncover security vulnerabilities a hacker could exploit. The penetration testing process, which can be automated and/or manual, is a way to give enterprises valuable information on how to tighten their security measures.

State of Ransomware Detection and Malware Prevention
August 03, 2020

The State of Ransomware Detection and Malware Prevention

Every year, as the cybersecurity requirements of businesses become more complex, technology continues to evolve beyond them. Although new Internet of Things (IoT) devices and cloud-based systems are helping companies run more efficiently, they can also pose significant cybersecurity risks. Earlier this year, the RevBits team published an article covering some of the biggest malware and ransomware attacks from 2020 and what enterprises could expect in 2020. Read more to discover the state of both malware and ransomware so far in 2020.

Contact Details

Contact RevBits

Message icon Request a Demo