How Dangerous Are Potentially Unwanted Applications or PUA’s?

Finjan TeamBlog, Cybersecurity

Finjan How Dangerous Are Potentially Unwanted Applications or PUA’s?

Corporate employees or private users whose systems or devices come with pre-installed software usually aren’t concerned with knowing exactly what programs they have, as long as they can do their jobs or use their hardware without any complications. But if your system contains or installs pre-packaged or bundled software, it may be at risk from Potentially Unwanted Applications. What Are … Read More

Leaked Credentials – An Insidious Problem for the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Leaked Credentials   An Insidious Problem for the Enterprise

Though data breaches have the potential to expose corporate secrets, finances, and intellectual property to prying eyes, a more insidious problem for the enterprise is the issue of leaked credentials. Email and network usernames, passwords, and related information may also form a major part of the corporate data leakage that follows a serious breach. And since these identifiers may be … Read More

Employee Security Awareness Training – Management Side

Finjan TeamBlog, Cybersecurity

Finjan Employee Security Awareness Training – Management Side

As many organizations have learned to their regret, a policy for cybersecurity – however comprehensive, proactive, and technologically sound it may be – is doomed to failure if its terms aren’t adhered to by stakeholders of the enterprise, across the board. This emphasizes the need both for eliciting buy-in to the concept and culture of security awareness, and for management … Read More

The Benefits of Real-Time Cyber Threat Intelligence

Finjan TeamBlog, Cybersecurity

Finjan The Benefits of Real Time Cyber Threat Intelligence

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air, or identified and adopted without knowledge of what they are, how they should be used, and … Read More

Employee Compliance and the Challenge to a Cybersecurity Strategy

Finjan TeamBlog, Cybersecurity

Finjan Employee Compliance and the Challenge to a Cybersecurity Strategy

Around 39% of respondents to a recent business survey conducted by Tech Pro Research said that their company has a formal, regularly updated policy for cybersecurity, typically covering employee training and automatic software updates, and often with the inclusion of new firewall or anti-virus products. Unfortunately, an equal number of those polled (39%) said that their companies didn’t have a … Read More