October is Cybersecurity Awareness Month!

Cybersecurity Awareness Month is an internationally recognized campaign held each October to inform the public and businesses of the importance of cybersecurity. This awareness campaign is focused on helping inform everyone how to be more secure online to protect themselves, their families and their workplace.

At Bulletproof, we have more than 18 years experience in the cybersecurity business, it’s in our DNA. Protecting privacy and data is built into everything we do.

And we’ve got lots lined-up this month, including:

  • Savvy tips
  • On-Demand Webinars
  • Workshops
  • Events
  • Informative Blog Posts
  • And more!

Each week we’ll highlight different aspects of cybersecurity including risks associated with outdated core system software and services, cloud security, and phishing AND we’ll help you test your knowledge!

71% of cyber attacks begin with spear-phishing emails

Cybersecurity 101 – From the Office Desk to Dining Room

Cybersecurity issues are becoming a day-to-day struggle for businesses and continue to be a growing priority for organizations of all sizes, across all industries. It’s important to look at cybersecurity from an individual and organizational level. And the first step is making sure you’re well informed and protected.

Transform yourself from a cybercrime target to an active defender. It’s not just the workplace you need to worry about – your personal passwords, smartphone, email, apps etc. are all a part of cybersecurity.

“There are around 24,000 malicious mobile apps blocked every day.” (Symantec)

“63% of data breaches exploit static passwords, specifically “weak, default or stolen passwords.”   (2016 Verizon Data Passwords Breach Investigations Report)

Top 5 Tips for Reducing Vulnerabilities & Staying Safe in 2018

This year has been the most expensive to date in terms of cyber breaches and their impact. According to Gemalto, the first six months of 2017 saw nearly 2 billion records lost or stolen in cyber breaches—a 164% increase from the last six months of 2016. With the average data breach in the U.S. costing $7.35 million (IBM).
Read more >>

security flaws at your desk you might have missed!

What’s wrong with this picture?

Can you spot the security flaws in this photo? Take the secure desk test to see how secure your workspace is.

Did you pass the secure desk test? Find out 

ISACA Security & Risk Conference 2018

ISACA Security & Risk Conference to Wrap-Up Cybersecurity Month

Bulletproof is proud to once again be the Platinum sponsor of this annual event. We’re even more excited to have our very own Trevor Flynn, Senior Solutions Specialist speak on how to Leverage Intelligent Cloud Security for Great User Experiences Mon Oct 29 from 2:30-3:30 p.m. at the Halifax Marriott Harbourfront Hotel.

See full speaker line-up

Are you Gambling on IT Security?

The average mean time to detect an incident in an organization is OVER 140 DAYS!

Whenever an attack succeeds, your game is impacted by more than the financial and operational loss. Reputation loss is bigger, and the damage is arguably even more wide-spread, in an intensely competitive industry with hundreds of other options for a player to choose to spend their money on. For example, when it was revealed that Steam Stealer malware was compromising 77,000 accounts a month, more than 20,000 players turned and walked away, and the loss of in-game revenue was massive. (Source)

ON-DEMAND WEBINAR: TOP 3 RISKS GAMING CAN NO LONGER IGNORE

Did you know that between 70% and 80% of the top-10 malware you detect could be avoided if your technology was updated correctly?

As a GLI company, Bulletproof is a leading provider of superior professional and technology services for the world’s top gaming organizations. In this webinar, you will gain an understanding of the types of dangers associated with ignoring the risks your IT staff know are lurking but struggle to get the support needed to close the gaps.

Some of the risks explored include:

  • Using outdated, older versions of core software components and services (Microsoft Office/ Windows, Windows server, SQL and Exchange)
  • Using outdated hardware as it relates to BIOS and firmware revisions on servers, networking gear, firewalls etc.
  • “Log Fatigue” or the non-active monitoring of systems, particularly security systems & security logs

GET THE WEBINAR

On-Demand Webinar:Top 3 IT Risks Gaming Can no Longer

ON-DEMAND WEBINAR: THE TOP 5 CASINO CYBERSECURITY ISSUES

Cybercriminals have become increasingly successful at illegally obtaining financial data from well-known casino-resorts. It’s easy to see why gaming regulators are focused on cybersecurity risks. Our team has completed audits and assessments throughout North America and have a wealth of knowledge on casino systems.

In this webinar, we share the Top 5 Real Life Examples of Cybersecurity Issues we are seeing on the ground in casinos and provide some advice on how to prevent them from happening in your organization.

Topics include:

  • What we are trying to protect
  • The security landscape overview
  • Cybersecurity Awareness and Management

GET THE WEBINAR

STAY CONNECTED ON SOCIAL MEDIA OR CHECK BACK HERE WEEKLY FOR UPDATES!

Bulletproof LinkedInBulletproof Facebook