Information Security Blog

Security Essentials in Microsoft Azure

Take advantage of ScienceSoft’s security guidelines and tips on how to secure your Azure-based cloud infrastructure and cut cybercriminals off your business.

How Phishing Simulation Prevents Phishing Attacks

ScienceSoft shares examples of phishing attacks and best practices aimed to prevent them in your company in the age of remote operations.

AWS Security Issues You Should Watch Out For

Learn about AWS security issues and how to address them: how to solve access control issues with proper identity and access management, how to eliminate improper configuration issues with penetration testing, and more.

Beware 6 Types of Cyberattacks To Preserve Your Company’s Reliability

Find out 6 most common types of cyberattacks and read how to ensure protection against them to keep your business’s reputation solid and clients satisfied.

The Top Payment Frauds in Ecommerce and How to Outsmart Scammers

Fraudulent payment card activity extends beyond an illegal use of stolen cards. Here are the most frequent ecommerce scams and protective measures for merchants to be on guard.

3 Levels of Corporate Network Security

Get detailed information on which cybersecurity measures to include into the corporate network protection plan depending on a company’s size, budget and domain.

How Enterprises Confront Mobile Security Threats

From data leakage to ransomware attacks, here are the best practices enterprises can use to combat mobile security threats.

Internet Safety 101 - How to Keep Your Employees Safe and Protected Online

Maintaining security practices to protect your employees is a challenge. Read about the key measures that need to be implemented to ensure the online protection of your staff.

7 Best Practices for Database Security

Protecting your systems from various vulnerabilities and threats even before getting hacked is the wisest thing one could do. It is better to prevent the data loss than trying to recover the lost data later.

Security Flaws Discovered in OpenEMR Healthcare Software

Several instances of unauthorized information disclosure were revealed within OpenEMR. One showed unauthenticated users' details, including the database name and the current version of OpenEMR an organization used.

COVID-19 – An update to our clients
In the uncertain time of Coronavirus (COVID-19) outbreak, I want to assure you that ScienceSoft remains fully operational and dedicated to supporting the continuity of our customers’ businesses. Most of ScienceSoft’s employees work remotely, and we’re equipped to provide our services in new conditions, with no impact on the quality of service or communication.
In the uncertain time of Coronavirus (COVID-19) outbreak, I want to assure you that ScienceSoft remains fully operational and dedicated to supporting the continuity of our customers’ businesses. Most of ScienceSoft’s employees work remotely, and we’re equipped to provide our services in new conditions, with no impact on the quality of service or communication.
Stay safe and healthy,
Nikolay Kurayev,
Chief Executive Officer at ScienceSoft