| Apr 6, 2020 Stop using online collaboration tools until you read this This article covers online collaboration tools security and explains the associated risks and best practices for protecting your workers.
| Apr 6, 2020 Zoom virtual meeting Vulnerabilities This threat report covers Zoom virtual meeting vulnerabilities with potential for immense concerns, their potential impact and Avertium's recommendations.
| Apr 2, 2020 HIPAA Compliance during the COVID-19 Outbreak HIPAA outlines special provisions for information sharing. We've outlined below the various scenarios in which the sharing of patient data without authorization is permissible.
| Mar 31, 2020 Cybersecurity tips for your remote workers We've put together a list of cybersecurity tips for users who are working from home for the near to mid-term future as the world responds and takes measures to contain the spread of COVID-19.
| Mar 26, 2020 Social Engineering Q&A: How to strengthen your weakest link Social engineering exploiting insider threats is a successful way hackers gain access to a business' data. Learn how to strengthen your weakest link.
| Mar 24, 2020 Catch of the Week: Phishing Scam Round-up, March 18 - 24, 2020 In the Catch of the Week post every Tuesday, we will feature a compilation of the latest articles from COVID-19 related scams and phishing campaigns.
| Mar 24, 2020 COVID-19 Phishing Scams to Watch For Covid-19 phishing scams and other social engineering tactics exploiting this confusing time are surfacing. Watch for these to protect your organization.
| Mar 23, 2020 Latest Pawn Storm attack methods An analysis of Pawn Storm aka APT28 aka Fancy Bear. It contains recommendations on how to prevent an attack in 2020.
| Mar 17, 2020 Avertium COVID-19 Preparedness and Response: An Open Letter from CEO Jeff Schmidt An open letter from Avertium's CEO Jeff Schmidt to customers and partners regarding COVID-19 preparedness and response.
| Mar 16, 2020 Comparing GDPR versus CCPA This article comparing GDPR versus CCPA explains these consumer data privacy regulations are similar in intent but very different in execution.