Blog Tag: Best-Practices

What is the GDPR? Simply put, the GDPR is data protection for citizens of the European Union. Noncompliant organizations will face fines of up to 4% of a...
Over 7% of phishing emails successfully trick users into opening malicious links or attachments, per Verizon — and Proofpoint research shows that 25.5%...
In order to keep a business running properly, you need to share files with and from internal employees, partners, and customers. File uploading is usually...
What Is Ransomware? In the unlikely event that you've never heard of the most rapidly growing threat in cyber security today, ransomware is a type of...
Blog
29 Apr 2016

April in Review

Take a look at our April newsletter for a convenient summary of what we've been up to here at OPSWAT. This month we hosted two Cyber Security Seminars in Seoul...
Blog
4 Apr 2016

March in Review

Take a look at our March newsletter for a convenient summary of what we've been up to here at OPSWAT. Our latest webinar and videos explain our approach to...
Blog
1 Mar 2016

February in Review

OPSWAT's streamlined version of our MetaDefender Product Family will be showcased at RSA, NEI, and at upcoming Cyber Security Seminars around the globe. We...
I recently attended a workshop for the Nuclear Information Technology Strategic Leadership (NITSL) in Minneapolis, MN. The focus of the workshop was to discuss...
The challenges in protecting hospitals from cyber attacks are very similar to those faced in ICS and SCADA environments; the equipment used in hospitals is not...
A few weeks ago, an OPSWAT employee received an unknown email with a suspicious file attachment. Following the best practices for receiving unknown emails with...
When addressing cyber security threats, human error is a factor that is often overlooked. However, according to the 2016 IBM Cyber Security Intelligence...
Cyber threats have received a lot of attention lately (e.g. Target, Sony, etc.), and the general public is becoming more aware of the damage that can be...