15 Sep Phishing | Category - Pivot Point Security Passwords Are Passé – Here’s How to Start Implementing Multi-Factor Authentication January 14, 2024 By Taylor Smith Is the ability to access a critical application using only a username and password a security red flag? In a word: Yes. Just ask the ma... Continue reading
16 May InfoSec Strategies | Category - Pivot Point Security WannaCry Ransomware Attack: Steps for Prevention January 15, 2024 By Taylor Smith On May 12th, 2017 cyber security professionals watched as the world was hit by the largest-scale ransomware attack to date. The ransomw... Continue reading
27 Apr InfoSec Strategies | Category - Pivot Point Security Yes, You Should Secure Web Cookies with Secure Flags (Even with Applications that Operate Over SSL) January 19, 2024 By Taylor Smith Editor's Note: This post was originally published in April 2015 and has been updated for accuracy and comprehensiveness. “Web cookies.... Continue reading
12 Apr InfoSec Strategies | Category - Pivot Point Security The WikiLeaks Vault 7 CIA Leak: What Businesses Need to Know and Do January 15, 2024 By Taylor Smith On March 7, 2017, the self-described “not-for-profit media organization” and whistleblowing website WikiLeaks began releasing the Vault... Continue reading
23 Feb InfoSec Strategies | Category - Pivot Point Security BYOD Security: 7 Tips for Reducing Your Risk January 12, 2024 By Taylor Smith In today’s highly connected world, it’s difficult to leave our office email and other key work applications behind. More and more of us... Continue reading