cybersecurity Articles - Perficient Blogs
Blog

Posts Tagged ‘cybersecurity’

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

Creating a Data Flow Diagram

A data flow diagram (DFD) documents the path data takes throughout your process/system. It is important to document and keep accurate and updated. Part of the value of such a diagram is that it shows where data is crossing a trust boundary. For example, user input (low trust) from a web site crosses a boundary […]

Read more

The Need for a National Health Record

In healthcare, which is more important privacy or safety? Are they mutually exclusive? In the leaps that we have made in cybersecurity in healthcare, can’t we have both? The main argument I hear against a National Health Record is people’s fear of a data breach. Contrary to that popular belief, one study, related to sharing […]

Read more

How To Use The AWS API With S3 Buckets In Your Pen Test

Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure.  In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests.  I’ll also show you how to […]

Read more

Ransomware Attack Affects 23 Texas Local Government Agencies

In what appears as a highly coordinated attack by a single actor, 23 local government agencies in the state of Texas were hit with ransomware. This extends the recent trend where local government entities were targeted, some of which have led to the attackers being paid millions of dollars via crypto-currency. A first line of […]

Read more

Here’s Why You Should be Using a Password Manager

I do not mean a notebook with handwritten passwords or even a spreadsheet.  I mean software designed specifically to generate and safely store your passwords.  We have all heard about sticky notes under the keyboard, or even worse on the monitor.  The current browsers can store your passwords for you and, assuming you have an […]

Read more

6 Reasons to Use Azure Active Directory

Azure Active Directory, commonly known as Azure AD, is “Microsoft’s cloud-based identity and access management service.1” It is a widely used IDaaS (identity and access management-as-a-service) that can integrate with an existing (or new) MVC-style web application, Web API, mobile app, and more to provide quick and easy authentication. I am no salesman (although it […]

Read more

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Read more

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Read more

10 Challenges Facing Medical Device Cybersecurity

Connected medical devices promise value for patients and physicians, but the devices also present new cybersecurity exposures that could put patients and their information at risk. The ECRI Institute, known for evaluating medical device cybersecurity, has developed a list of 10 problems facing medical device cybersecurity. These 10 key issues have the potential to be […]

Read more

Marketing and IT: A Team Effort in Cybersecurity

No matter how hard we try, it’s nearly impossible to keep our inbox free from junk mail and phishing threats. This is an annoyance for us, but for organizations, security threats pose a serious risk.  The looming threats facing businesses push them to constantly seek new technology in hopes of solving these issues. As technology improves, other organizational […]

Read more

Why Cybersecurity is Important to Marketers – Not Just IT

The Responsibility is Shifting When Adobe and Microsoft announced their partnership – and that Microsoft Azure is the preferred platform for hosting Adobe Marketing Cloud – the line between marketing and IT became even more blurred. The crossover between marketing technology and IT is not new, but it is continuing to increase year-on-year with no […]

Read more

Why Banks And Insurance Companies Need To Continue Investing In Tech

While some companies are keen on trimming the number of legacy IT applications through consolidation, they all agree that investments in technology are critical when it comes to operating in a digital world that has created incredibly high customer expectations. The adoption of mobile devices has significantly changed the operating landscape. During his remarks that […]

Read more

Common Security Risks for ECM Systems

Cybersecurity is a hot topic across all industries, with most companies recognizing the importance of identifying and mitigating risk factors across IT environments. Recent news headlines have focused on external threats, but internal risks represent over $40 billion in losses annually. When developing an enterprise security plan, it’s important to account for common IT security […]

Read more

Mulling Ransomware – Eye-Opening Cybersecurity Statistics

Cisco recently released their Annual Cybersecurity report for 2017, which revealed several statistics I thought were real eye openers. You can pick up a copy here: http://b2me.cisco.com/en-us-annual-cybersecurity-report-2017. Of the major findings in this document, I consider a few quite concerning, in particular: “Spam accounts for nearly two-thirds (65 percent) of total email volume… about 8 percent […]

Read more

War On Cybercrime [Trend To Watch]

In a survey conducted by the Depository Trust & Clearing Corporation (DTCC), the premier post-trade market infrastructure for the global financial services industry, 56% of respondents rated cyber risk a top-five concern, while 22% indicated it was their biggest concern. A recent quarterly Cybersecurity Market Report published by Cybersecurity Ventures projects that $1 trillion will be spent […]

Read more

[Guide] Top 15 Financial Services Trends For 2017

While we can’t always be certain which trends the new year will bring, we can offer predictions based on our conversations with industry executives and our customers, looking at what companies have accomplished in the past year, and the initiatives they already have in place for the future. In fact, that’s exactly how we compiled […]

Read more

How to Mitigate Security Risks with APIs

APIs in the Current World With the advancement of SOA and new-age technologies coming door-to-door, we see how the Internet of Things is touching our everyday lives, be it from Apple Watch and Fitbit to building apps in automobiles, banking, the retail industry, etc. I recently read somewhere that eCommerce for JC Penny is gaining […]

Read more

Fighting Cybercrime, From JPMorgan To Bank Of America

A new quarterly Cybersecurity Market Report was published by Cybersecurity Ventures, projecting $1 trillion will be spent on cybersecurity between 2017 and 2021. According to Steve Morgan, founder and editor-in-chief of Cybersecurity Ventures, the increase in cybercrime, such as ransomware and malware, and the large number of digital devices being rapidly deployed by organizations and […]

Read more

BofA CEO Shares 3 Keys To Success For Today’s Banks

Dennis K. Berman, financial editor of The Wall Street Journal, asked one of the simplest, yet greatest questions anyone could ask an executive at a major financial institution. During WSJ’s CFO Network conference, he asked Bank of America Chairman and CEO Brian Moynihan the following: “If you were building a bank today from scratch, what […]

Read more

Protecting You And Your Clients Through Technology And Strategy

Every industry experiences cybercrime, but probably none more than financial services, at an average annualized cost of $13.5 million. If you look at the Breach Level Index, you will notice that some type of security breach occurs at financial institutions almost daily. These breaches can involve anywhere from a handful of records to tens of […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up