The hidden business costs of working remotely
The benefits of working remotely are numerous, but studies are finding there are significant hidden costs that need to be factored in.
Read More The hidden business costs of working remotelyThe benefits of working remotely are numerous, but studies are finding there are significant hidden costs that need to be factored in.
Read More The hidden business costs of working remotelyEvery new presidential administration brings change, one way or another. Learn what President Joseph Biden is facing on the cybersecurity front, along with some tips for government and businesses.
Read More How will cybersecurity change with a new U.S. president? Pros identify the biggest needsGartner research finds that only 11% of companies have resumed travel or plan to within the next six months.
Read More Business travelers are still at home due to employee worries, the slow vaccine rollout and the patchwork of COVID-19 rulesWith a stalkerware app on your phone, another person can spy on your activities and view your personal information, Kaspersky says.
Read More How stalkerware can threaten your safety and privacy, and how to avoid itJack Wallen tries out the Firewalla Gold to see if it’s worthy of serving as your work-from-home security device.
Read More Firewalla is a solid entry to beef up the security of your work-from-home networkThe Lazarus group had a busy 2020, and 2021 is shaping up to be another devastatingly productive year for one of the most dangerous hacking groups on the planet.
Read More North Korean hackers find another new target: The defense industryThe now-patched vulnerability could have allowed attackers to scan a company’s internal network and gain access to sensitive data, says Positive Technologies.
Read More VMWare patches bug that put many large networks at riskThe Stanford Internet Observatory alleged that the Chinese government may have had access to audio data from Clubhouse. Here’s what users should know.
Read More Security concerns arise over popular Clubhouse app after ties to China-based company revealedTwo developers, sponsored by Google, will dedicate their time to addressing vulnerabilities in the Linux kernel as part of a wider effort to improve the security of open-source software.
Read More Google: We’re funding developers to work full-time on Linux securityA new FlexJobs survey reveals 14 of the most common–and successful–job-search scams. Here’s how to identify them and not become a victim.
Read More How to protect yourself from common job search scamsOne in four remote workers reuses work credentials on consumer sites, but IT isn’t doing them any favors by reportedly failing to provide essential protection while away from the office.
Read More What do users and IT have in common? They’re both to blame for poor remote security practicesTo better combat cyberattacks, prevention is better than detection, says Check Point Software.
Read More 5 tips to protect your organization against the next cyberattackUnderstanding the nature of the latest threats can help you identify shifts in tactics and techniques, prioritize security resources and test the most likely scenarios, says IBM X-Force.
Read More How to combat the latest security threats in 2021As more organizations migrate to the cloud, cybercriminals are taking advantage of the vulnerabilities in online apps, says Netskope.
Read More 10 tips for protecting your cloud data and accountsAttackers used an outdated File Transfer Appliance from Accellion to gain access to data, the company said.
Read More Kroger data breach highlights urgent need to replace legacy, end-of-life toolsBlackBerry researchers see more double-extortion ransomware attacks, attackers demanding ransom from healthcare patients, and rising bitcoin prices driving the growth of ransomware.
Read More Ransomware threats to watch for in 2021 include crimeware-as-a-serviceA new survey of tech decision makers finds that security concerns are high and trust is low when it comes to artificial intelligence.
Read More Companies are using AI to hit business goals, even though they can’t explain how it worksProtecting the U.S. power grid from serious outages, like the one following a 2021 winter storm in Texas, will require a better use of data analytics, modeling and policy making says industry expert.
Read More Texas power outage: Data analytics, modeling and policy making will be key to preventing similar disastersRob Robinson, client partner in utilities practice for Capgemini, talks with TechRepublic about what the catastrophic outages in Texas should teach us about predicting threats to U.S. the power grid.
Read More Texas power outage highlights need for better use of data analytics, modeling and policy makingDDoS, SQL injection, and man-in-the-middle are just a few of the attacks that can compromise your network. Tom Merritt lists five things to know about network attacks.
Read More Top 5 things to know about network attacksDDoS, SQL injection and man-in-the-middle are just a few of the attacks that can compromise your network. Tom Merritt lists five things to know about network attacks.
Read More Network attacks: 5 things to knowThese eight online courses teach the fundamentals you need to pass various IT and cybersecurity certification exams from Cisco and CompTIA.
Read More Ace your cybersecurity and IT certification exams by taking these prep coursesWith the shift to remote learning, schools are facing greater security risks and smaller financial margins, says BlueVoyant.
Read More How cyberattacks can threaten colleges and universitiesMost organizations don’t give the same thought and attention to their non-human workers, such as bots, RPAs and service accounts, as they do human workers and identity lifecycles.
Read More Why non-human workers can increase security issues in your businessA study on CIO and CISO prioritization showed these two areas are most important this year. Cloud security is another area high on their lists.
Read More Cybersecurity pros: Automation and app security are top priorities in 2021Team8 surveyed cybersecurity leaders to find out where they will spend their money in 2021.
Read More These two areas are CISOs’ top priorities this yearKnown as Silver Sparrow, the malware’s intent is still unknown as it has yet to deliver an actual payload, says security firm Red Canary.
Read More Mysterious malware infects 30,000 Mac computersEnterprise VPNs are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about six viable choices for businesses.
Read More The top 6 enterprise VPNs to use in 2021With the free version of LastPass now limiting where you can sync your passwords, here are a few other options.
Read More Free password manager alternatives to LastPassAccurics analyzed cloud-native configurations over the last 7 months to identify ongoing and new threats.
Read More New cloud security analysis finds default configurations and identity management are the biggest concernsA week-long outage for Kia is reportedly connected to a ransomware attack from the DoppelPaymer gang, says BleepingComputer.
Read More Kia outage may be the result of ransomwareHackers are now sending messages that hide fake links in the HTTP prefix, bypassing email filters, says security firm GreatHorn.
Read More New malformed URL phishing technique can make attacks harder to spotIf you need to gather information on user logins for your Linux servers, Jack Wallen has just the tool for you.
Read More How to find details about user logins on LinuxScammers are impersonating the IRS with emails carrying the subject line “Verifying your EFIN before e-filing.”
Read More IRS issues urgent notice on scams aimed at tax professionalsAccording to Forrester, ZTE will be most helpful with securing and enabling remote workers while removing the difficult user VPNs.
Read More Forrester report highlights Zero Trust Edge model for networking and security infrastructureJack Wallen shows you how to gain a bit more security on your Linux servers by blocking users from adding cron jobs.
Read More Linux 101: How to block users from setting up their own cron jobsThe Dark Web allows cybercriminals to create a Cyber Attacks-as-a-Service ecosystem that outmaneuvers security defenses. Here are tips on how businesses can try to thwart cybercrime.
Read More 4 ways to defend against the Dark Web’s cybercrime ecosystem, according to MIT researchersIn a webinar Wednesday, former US Homeland Security director Christopher Krebs also suggested organizations have COVID workforce coordinators and that cloud mail providers activate MFA by default.
Read More Cybersecurity needs to be proactive with involvement from business leadersThis comprehensive guide covers everything you need to know about password management app LastPass, including recent restrictions on free accounts.
Read More LastPass password management app: A cheat sheetThe security company found that 85% of workers spend up to five hours a week watching YouTube, listening to podcasts, or exercising during work hours.
Read More Kaspersky: Goofing off a little at work may help security teams stay focusedMachine learning is helpful to many organizations in the tech industry, but it can have a downside. Tom Merritt lists five things to know about adversarial attacks.
Read More Top 5 things to know about adversarial attacksInformation protection makes sure that only people with permissions see data in Power BI, while retaining the ability to share top-level trends, balancing productivity and security.
Read More Microsoft’s Power BI gets new tools to prevent leakage of confidential dataMachine learning is helpful to many organizations in the tech industry, but it can have a downside. Tom Merritt lists five things to know about adversarial attacks.
Read More Adversarial attacks: 5 things to knowA panel of experts considers the best methods for safe domestic and international air travel including proof of testing, vaccination passports, and digital health passes.
Read More The fine line between global COVID-19 protocols and privacyAnalysts from Trend Micro rate DDoS attacks and electronic jamming as some of the highest cybersecurity risks for connected cars.
Read More Top 5 security risks to connected cars, according to Trend MicroSpyware activity spiked in 2020, and the malware-as-a-service business model got more sophisticated.
Read More State of malware: 3 key findings in the latest Malwarebytes reportTo keep your Linux servers and desktops as secure as possible, you should check for (and remove) legacy communication services. Jack Wallen shows you how.
Read More Linux 101: How to remove legacy communication servicesMultiple senators have demanded a hearing on what court officials know about the hackers’ access to sensitive filings. The effects could make accessing documents harder for lawyers.
Read More US Court system demands massive changes to court documents after SolarWinds hackAgile thinking is important in dealing with cyberattacks. Read one psychologist’s tips for cybersecurity professionals on how to adapt and stop the attackers.
Read More How micro-drilling can enhance your cybersecurity trainingCybersecurity insurance can compensate you in the event of a cyberattack. But how do you determine the right policy for your needs?
Read More Why cybersecurity insurance may be worth the costWhen workers need to get things done in a dangerous locale, sometimes they have to be distant. This opens up plenty of cybersecurity hazards. We spoke with one expert about how to achieve that security.
Read More Working at a safe distance, safely: Remote work at industrial sites brings extra cyber riskDevelopers must stop saving secrets in code. One way to avoid that is to use HashiCorp’s Vault. Jack Wallen shows you how to install this tool and take your first steps in its usage.
Read More How to use the Vault command line tool to store your code secrets21 of the 24 dating apps examined were tagged with the “*Privacy Not Included” warning label.
Read More Mozilla privacy report on dating apps singles out Grindr for serious security lapsesMalware designed to steal log-in information saved in browsers has infected 16 million computers and swiped credentials for up to 174,800 accounts.
Read More NordVPN puts the price tag of stolen streaming subscriptions at $38 millionMalicious Valentine’s Day-themed phishing campaigns are up 29% from last year, according to Check Point Research.
Read More Love is in the air—and cybercriminals are taking advantageA new breach analysis from CI Security found that cybercriminals are going after medical billing and insurance companies.
Read More 177% increase: Hackers grabbed 21.3 million healthcare records in the second half of 2020While it’s logical to assume seniors would be primary targets, a new report revealed that millennials were actually the most targeted demographic group of the more than 50 billion spam calls made in 2020.
Read More Hit block caller: 75% of Americans were targeted by scammersAll users of Plex Media Server are urged to apply the hotfix, which directs their servers to respond to UDP requests only from the local network and not the public internet.
Read More Plex patches media server bug potentially exploited by DDoS attackersLocal officials said someone took over their TeamViewer system and dangerously increased the levels of lye in the town’s water.
Read More FBI, Secret Service investigating cyberattack on Florida water treatment plantIT teams should look for services with automatic alerts about user behavior, logging, scalability, and central management.
Read More How to select an enterprise VPN that protects data but doesn’t drive users crazyActive accounts for people who have left your organization can make exploitation easy, according to Sophos.
Read More Ransomware can be installed via ghost accounts