About Rosemarie O'Connor

This author has not yet filled in any details.
So far Rosemarie O'Connor has created 7 blog entries.

Artificial Intelligence & Cybersecurity

Artificial Intelligence & Cybersecurity Artificial Intelligence (AI) is progressively being ingrained in the fabric of business and is being broadly applied across a variety of application use cases. However, not all industries are at the same level of AI adoption: the information technology and telecommunications industry are the most advanced, with the automobile sector trailing closely behind.    Did you know ...

2021-09-10T10:51:53-04:00September 10th, 2021|

Reactive vs Proactive Cybersecurity

Reactive vs Proactive Cybersecurity Cybercrime is expected to cost the world's economy $10.5 trillion annually by 2025. Although it's almost impossible to wrap your head around a number like that, the reality is that security threats are real, and they affect virtually everybody, from large multinational corporations to individual businesses and everything in between. Cyberthreats are becoming considerably more dangerous. Attackers ...

2021-08-30T11:00:54-04:00August 30th, 2021|

Social Engineering Attacks on the Rise

Social Engineering Attacks on the Rise Social engineering techniques are various cyberattacks in which threat actors manipulate people into supplying sensitive data, account credentials, or enabling access to secure networks or systems to get sensitive information. Office files comprise 48% of all malicious email attachments, and spear-phishing was used by 65% of malicious actors as the primary mode of attack. In ...

2021-08-25T11:38:47-04:00August 25th, 2021|

​​Recent Rise of Ransomware Attacks: What Are the Main Drivers?

 ​​Recent Rise of Ransomware Attacks: What Are the Main Drivers? Ransomware is not a new phenomenon. The earliest recorded incident goes as far back as the 1980s. However, today’s ransomware operates at a scale and sophistication that makes it virtually unrecognizable from its early predecessors. Each year, ransomware attacks are hitting a new high. In its annual Internet Crime Report, the ...

2021-08-23T14:03:37-04:00August 23rd, 2021|

What Is Passwordless Authentication?

Passwordless authentication ushers in a new age in security. A large percentage of data breaches are caused by passwords that are incorrectly set. Furthermore, forgotten passwords cost businesses a lot of money since users are unable to access important apps.   While solutions like multi-factor authentication have helped to decrease cyber-attacks, passwordless architecture offers businesses huge potential to increase employee productivity ...

2021-08-04T14:15:40-04:00August 4th, 2021|

Microsoft Print Spooler Patch and Security Implications from Unpatched Systems

Microsoft Print Spooler Patch and Security Implications from Unpatched Systems At the start of July 2021, Microsoft began rolling out an emergency patch to resolve a critical vulnerability in its Windows Print Spooler service. Nicknamed PrintNightmare, the flaw was unintentionally disclosed when security researchers accidentally published exploit code.  Whereas the Redmond-based tech behemoth has issued security updates to address the gap, ...

2021-07-23T13:11:25-04:00July 23rd, 2021|

Vulnerability Scanning vs. Penetration Testing – What you need to know

Vulnerability Scanning vs. Penetration Testing   Trying to secure your sensitive business data from cyber-attacks and threat actors has never been more complicated than it is today. To protect your business, you need a strategic cybersecurity plan, well-managed cyber resources, and a group of cybersecurity experts on your side.    End users and staff utilizing your business network are the biggest ...

2021-06-23T12:49:51-04:00June 23rd, 2021|
Go to Top