About StratoZen

This author has not yet filled in any details.
So far StratoZen has created 162 blog entries.

Quick Tips for Responding to a Data Breach

Businesses are under immense pressure to keep their data safe, especially healthcare or financial organizations that store so much sensitive information. A slow response to a data breach can cost fines, customer trust and repair time. Here are […]

By |2020-03-03T21:51:38+00:00February 28th, 2020|Cybersecurity|Comments Off on Quick Tips for Responding to a Data Breach

Is it Safe to Use Face Recognition ID?

Face recognition is a recent method that smartphone developers use for increased security. It allows the user to unlock their phone by simply looking at it. Expert cybersecurity companies know that convenience often leads to vulnerability. […]

By |2020-03-06T22:34:08+00:00February 23rd, 2020|Articles, Cybersecurity|Comments Off on Is it Safe to Use Face Recognition ID?

Understanding Web Cache Deception Attacks

Web cache deception attacks are still a major cybersecurity issue for many popular websites. According to ZDNet, 25 of Alexa Top 5,000 websites are still impacted by these types of attacks. That number may seem small—until you understand […]

By |2020-03-04T22:51:58+00:00February 22nd, 2020|Articles, Cybersecurity|Comments Off on Understanding Web Cache Deception Attacks

Practicing Safe Downloading Habits

Many of us download content over the internet on a daily basis. Whether it’s music, videos or work files, even some software updates are downloaded from the internet. However, cybersecurity companies warn that these files can contain

By |2020-03-06T20:30:15+00:00February 21st, 2020|Articles, SIEM and SOC|Comments Off on Practicing Safe Downloading Habits

Keeping Your Smartphone Protected

For many of us, our smartphones play a big role in our everyday lives. We use it to socialize, navigate, shop and even do our banking. It’s extremely convenient. Unfortunately, to accomplish these tasks we often share personal […]

By |2020-03-09T17:33:24+00:00February 14th, 2020|Articles, Cybersecurity|Comments Off on Keeping Your Smartphone Protected

What is SOAR and Why is it Important?

Security Orchestration, Automation and Response (SOAR) has been getting a lot of attention recently. I thought it would be good to take a moment and discuss what it is and why it is important to the industry. 

Gartner was the […]

By |2020-02-21T20:35:51+00:00January 27th, 2020|Blogs, Home Page, News, Resource Featured Post|Comments Off on What is SOAR and Why is it Important?

Practices that Leave Your Company Vulnerable to Cyber Attacks

It’s easy to pick up bad habits. Cybersecurity companies know that this is especially true when it comes to online habits. We become focused on our tasks and meetings and small security measures […]

By |2020-02-06T19:38:44+00:00January 21st, 2020|Articles|Comments Off on Practices that Leave Your Company Vulnerable to Cyber Attacks