Jan 25, 2022 | Technology, Cybersecurity & Risk Management, Resources
Authentication is one of the pillars of cybersecurity. Nevertheless, weaknesses in its mechanism, or in the process around authentication, are still a common root cause for organizations of all sizes falling prey to online attacks. In 2021 alone, countless...
Dec 7, 2021 | Technology, Cybersecurity & Risk Management
How Vulnerable Are You to A Cyberattack? The short answer – extremely vulnerable if left unchecked. The technology and approach behind a cybersecurity attack evolves daily, putting everyone at risk. Equally concerning is the malicious intent behind...
Aug 4, 2021 | Cybersecurity & Risk Management, Technology
Risk can’t be avoided in today’s business world – but it can be mitigated. Most businesses rely on a range of third-party services and applications. The good news is that these services can help an organization work better, faster, and more economically. The bad news...
Jan 27, 2021 | Cybersecurity Bulletin, Cybersecurity & Risk Management, Technology
CYBERSECURITY BULLETIN – A vulnerability was recently announced – CVE-2021-3156 – in the program ‘Sudo’. The vulnerability allows a local, authenticated person the ability to gain administrative or system privileges. Qualys successfully...
Apr 13, 2020 | Cybersecurity Bulletin, Cybersecurity & Risk Management, Technology
CYBERSECURITY BULLETIN – Hope you enjoyed part one of the Mariner Cybersecurity Bulletin dedicated to cyber safety in the home office. Check out some additional ‘work from home’ tips: Video conference safely: If you have not heard of Zoom yet, then...
Apr 9, 2020 | Cybersecurity Bulletin, Cybersecurity & Risk Management, Technology
CYBERSECURITY BULLETIN – With social distancing paramount to keeping us safe, those who are able have moved into their home offices, or make-shift dining room headquarters. This second edition of the Mariner Cybersecurity Bulletin is all about how you can work...