What you need to know

Not So Boring Blog

  1. Home
  2.  » Blog

Why you should monitor for exposed credentials

Boring's Not So Boring Blog Passwords are a twentieth-century solution to a modern-day problem. Unfortunately, usernames and passwords are still the most common method for logging onto services including corporate networks, social media sites, e-commerce sites and...

read more

How to handle compromised credentials

Boring's Not So Boring Blog You’ve just discovered there are compromised employee credentials or other sensitive data of your company exposed and available on the Dark Web.  The reality is, once exposed on the Dark Web, your information cannot ever be completely...

read more

Are your credentials in the Dark Web?

Boring's Not So Boring Blog Digital credentials are at risk 39% of adults in the U.S. use the same or very similar passwords for multiple online services, which increases to 47% for adults ages 18-29.  Passwords are a twentieth-century solution to a twenty-first...

read more

Protecting your company from the Dark Web

Boring's Not So Boring Blog   CORPORATE DOMAIN MONITORINGStolen user credentials (emails/passwords) found on the Dark Web can indicate that your company or a 3rd party application/website that your employees use may have been compromised and that you should take...

read more

5 common social engineering scams

Boring's Not So Boring Blog  Social engineering scams have been going on for years and yet, we continue to fall for them every single day. This is due to the overwhelming lack of cybersecurity training available to the employees of organizations big and small. In an...

read more

Humans & cybersecurity practices

Boring's Not So Boring Blog Based on a comprehensive survey of 5,000 IT managers across 26 countries, Cybersecurity: The Human Challenge provides brand new insights into the state of cybersecurity skills and resources across the globe. It reveals the realities facing...

read more

COVID-19 & Healthcare Cybersecurity

Boring's Not So Boring Blog COVID-19 has phenomenally altered the way healthcare functions, with growing adoption of telehealth and remote patient monitoring. The threat landscape in healthcare, too, has become fertile ground for phishing campaigns, malware,...

read more

Keep your data safe from phishing attacks!

Boring's Not So Boring Blog Cybercrime is on the rise, and hackers are using any opportunity to take advantage of an unknowing victim to gain access to personal information for financial gain. One commonly used tactic is phishing. Phishing messages are crafted to...

read more

Contact Us

Share This