
Feb 02, 2021
3 min read
How Remote Working Introduces Additional Third-Party Risk
When the coronavirus first reared its ugly head, we didn’t truly understand the implications it would have on our lives and on our businesses. But by March 2020 it was pretty clear that the implications would be huge, beginning with businesses moving their entire operations to remote locations, ostensibly overnight. This sudden transition from in-company to remote working presented a...

Oct 06, 2020
3 min read
Securing Your Suppliers: Preventing Phishing Attacks
Phishing, which is an attempt to deceive a victim so as to gain access to confidential information and/or distribute infected files, is nothing new. But it’s gotten worse. According to the Verizon Business 2020 Data Breach Investigations Report, phishing was to blame for more than 67% of breaches—but that was before coronavirus. In March, phishing attacks rose 667%, and research...

May 21, 2020
5 min read
How to Achieve Cyber Resilience in 4 Steps
Cyber resilience is the ability to prepare for, respond to and recover from cyberattacks. This can include a set of policies and procedures that will help mitigate risk during normal operations within the processes and workflows of an organization. An organization with true cyber resilience can quickly get back to business as usual following any incident that is out of...

Mar 09, 2020
3 min read
Service Announcement: The Right Questions to Ask Your Vendors in Times of…
In the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action. One of these cybersecurity risks emanates from the supply chain. While a large company may be able to quickly undergo the transition from a relatively concentrated workforce...

Jan 30, 2020
3 min read
Touchdown! Measuring External Cyber Posture and the NFL Hack
This week, sports fans reacted with disbelief when it was discovered that 15 NFL teams’ social media accounts were hacked. Those targeted included the two teams that will play in the Super Bowl LIV Championship match on February 2, the Kansas City Chiefs and the San Francisco 49ers. In addition to the Super Bowl contenders, the following teams were hacked...

Dec 19, 2019
3 min read
DishSnitch: The Who Left Dirty Dishes in the Sink” Detector”
Dirty dishes! Our team is dealing with an abundance of those. Argh! Which brought our researchers to develop a DishSnitch. Yeah, an automated app that detects and shames the culprit by sending the full evidence—including pics—to the company’s dedicated Slack. **Face palm** For those who are interested in the DishSnitch, we placed the app’s files free to grab on Github—you’ll...

Jul 02, 2019
3 min read
Expert Advice: How to Avoid Misconfigured Servers
Lately, we’ve seen a lot of news reports about databases inadvertently being exposed on the internet as a result of servers that are not configured correctly. This exposed data can include private information such as insurance records, photos or even veteran combat injuries. Why is This Happening? With so many incidents like these, it makes us wonder: Why is it...

Nov 14, 2018
7 min read
10 Tips for Secure Online Shopping on Cyber Monday
Cyber Monday is just around the corner, but—let’s face it—shopping online is a lot riskier than it used to be. It’s true that, as more and more brands offer competitive prices online, shoppers can get some great deals at this time of year. At the same time, however, hackers are increasingly finding new and creative ways to steal your personal...

Nov 08, 2018
3 min read
7 Revealing Third-Party Risk Statistics Every CISO Should Know
Plenty of companies work with third-party suppliers, but not everyone fully comprehends how doing so significantly impacts a company’s cyber risk. As we are inundated with news reports about massive third-party data breaches, it’s important to understand why they keep happening, and why third-party security management is so crucial to businesses. Here are seven eye-opening facts to be aware of:...

Sep 25, 2018
5 min read
Which NFL Teams Have the Best Cyber Defense?
With football season just around the corner, we at Panorays decided to test the strength of NFL teams’ cyber defenses. We did this by simulating a hacker’s view to uncover cyber gaps on NFL team websites and digital assets. Above all, we wanted to know: Would there be any correlation between how teams played on the field and how their...
Popular Posts

Feb 10, 2022
1 min read
The Most Common Third-Party Cyber Gaps Revealed
Wouldn’t it be great if you could get a sneak peek at all the upcoming 2022 cyberattacks? Yes, it would be. But, since that’s not going to happen, we’ve done the next best thing. Panorays used data from our cyber posture evaluations of tens of thousands of third parties from various industries over an extensive period of time to find...

Aug 26, 2021
3 min read
4 Ways to See if You Are at Risk of a Vendor…
Recent supply chain attacks such as Kaseya, Accellion and SolarWinds have illustrated that when it comes to vendor breaches, it’s not if, but when. While it’s impossible to predict cyberattacks, there are key steps that you can take with your vendors to determine if you might be at risk. Here are 4 key strategies: 1. Monitor security posture It’s important...

Jan 03, 2022
3 min read
5 Resolutions for Reducing Third-Party Cyber Risk in 2022
If there’s one thing we’ve all learned, it’s that supply chain attacks are not going away anytime soon. Last year, we saw major cyber incidents involving Accellion, Kaseya, Codecov and others; next year, there will certainly be more. To help prevent and respond to similar cyber incidents, it’s essential to consider how best to reduce third-party risk. How can this...