Digital You

New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report  2020 was a year unlike any other. We transitioned from the corporate office to the home office, participated in distance learning, and figured out how to communicate with one another from afar. We sought out new forms of entertainment by streaming countless movies and TV […]

The post New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report appeared first on McAfee Blogs.

Read More New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report

Digital You

New Year, New Digital You: Canadian Survey Findings from McAfee McAfee is headquartered in the U.S. and with our impressive global footprint protecting over 600 million devices protecting users’ connected lives isn’t just a priority for one location, but for the entire world that we serve.  As Site Leader of our Consumer Ontario offices, when […]

The post New Year, New Digital You: Canadian Survey Findings from McAfee appeared first on McAfee Blogs.

Read More New Year, New Digital You: Canadian Survey Findings from McAfee

New and updated supplemental materials for NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations, and NIST SP 800-53B, Control Baselines for Information Systems and Organizations, are …

Read More NIST Releases Supplemental Materials for SP 800-53 and SP 800-53B: Control Catalog and Control Baselines in Spreadsheet Format

Organizations frequently share information through various information exchange channels based on mission and business needs. In order to protect the confidentiality, integrity, and availability of exchanged information commensurate with risk, the info…

Read More Managing the Security of Information Exchanges: Draft NIST SP 800-47 Revision 1 Available for Comment

In 2020, we recorded 1,120 breaches and cyber attacks that were reported on in mainstream media, which accounted for 20,120,074,547 leaked records. Compiling this information enables us to see how security incidents occur and the trends to look out for. Did you know, for example, that the number of disclosed incidents shot up in the second half of the year, showing the impact that COVID-19 has had on organisations? Or that there was a 50% increase in breached records compared to 2019? In this blog, we take a closer look at this data. You can also find a summary in

The post 2020 cyber security statistics appeared first on IT Governance UK Blog.

Read More 2020 cyber security statistics

Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit miners had slipped off the radar as Bitcoin’s value plummeted in recent years, but now authors are hoping to profit off the latest price increase. Researchers have identified […]

The post Cyber News Rundown: Cryptomining Malware Resurgent appeared first on Webroot Blog.

Read More Cyber News Rundown: Cryptomining Malware Resurgent

Data Privacy Day

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […]

The post Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) appeared first on McAfee Blogs.

Read More Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)

Denial-of-service (DoS) attacks are intended to shut down or severely disrupt an organisation’s systems. Unlike most cyber attacks, the goal isn’t to steal sensitive information but to frustrate the victim by knocking their website offline. The criminal hacker therefore doesn’t profit from the attack, but the loss of service can cost the victim up to £35,000. Why would an attacker be interested in doing this? Typically, it’s because they hold a grudge against the target – many DoS attacks are politically motivated – although some attacks are used to distract the victim as the attacker launches a more sophisticated attack

The post What is a DoS (denial-of-service) attack? appeared first on IT Governance UK Blog.

Read More What is a DoS (denial-of-service) attack?

Digital babies

The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet footprints even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. That “Hello, […]

The post The Connected Lives of Babies: Protecting Their First Footprints in the Digital World appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting Their First Footprints in the Digital World

Parler, the beleaguered social network advertised as a “free speech” alternative to Facebook and Twitter, has had a tough month. Apple and Google removed the Parler app from its stores, and Amazon blocked the platform from using its hosting services. Parler has since found a home in DDoS-Guard, a Russian digital infrastructure company. But now it appears DDoS-Guard is about to be relieved of more than two-thirds of the Internet address space the company leases to clients — including the Internet addresses currently occupied by Parler.

Read More DDoS-Guard To Forfeit Internet Space Occupied by Parler

Ransomware Alert

Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and students returned to the virtual classroom. But according to the FBI, cyberattacks are likely to disrupt online learning in the new year. As of December 2020, the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and […]

The post Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 appeared first on McAfee Blogs.

Read More Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021

Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology to market. In this Employee Spotlight, we talk to Account Development Executive, Jordan Gray, who works with C-level executives to integrate threat intelligence solutions within their environments. […]

The post Employee Spotlight: The Human Faces Behind Artificial Intelligence appeared first on Webroot Blog.

Read More Employee Spotlight: The Human Faces Behind Artificial Intelligence

Holiday Video Chat

  The Connected Lives of Babies: Protecting Their First Footprints in the Digital World, Part Two Picture an infant with a credit card. In her name. With a $10,000 limit. Well, it happens. As recent as 2017, it was estimated that more than 1 million children in the U.S. were victims of identity theft. Of […]

The post The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two

Your employees encounter potential cyber security threats on a daily basis. Perhaps there’s a new face in the office that they don’t recognise, or a new password they need to remember, or a database of sensitive information that they need to upload onto the Cloud. In The Psychology of Information Security, Leron Zinatullin explains how employees respond to those challenges and explains why they make the decisions they do. For example, he found that employees usually don’t have a solid understanding of information security or their obligations to protect information. In the rare cases where employees are aware of and follow

The post How your staff make security decisions: The psychology of information security appeared first on IT Governance UK Blog.

Read More How your staff make security decisions: The psychology of information security

Digital from birth

The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their first footprints internet even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. […]

The post The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1 appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1

We’re not going to lie: implementing an ISO 27001-compliant ISMS (information security management system) can be a challenge. But as the saying goes, nothing worth having comes easy, and ISO 27001 is definitely worth having. If you’re just getting started with ISO 27001, we’ve compiled this 9 step implementation checklist to help you along the way. Step 1: Assemble an implementation team Your first task is to appoint a project leader to oversee the implementation of the ISMS. They should have a well-rounded knowledge of information security as well as the authority to lead a team and give orders to

The post ISO 27001 checklist: a step-by-step guide to implementation appeared first on IT Governance UK Blog.

Read More ISO 27001 checklist: a step-by-step guide to implementation

A little bit of a change of pace this week with the video being solely on the events unfolding around removing content, people and even entire platforms from the internet. These are significant events in history, regardless of your political persuasion, and they’re likely to have a very long-lasting impact

Read More Weekly Update 226

Depending on your life experiences, the phrase (or country song by Eric Church) “two pink lines” may bring up a wide range of powerful emotions.    I suspect, like many fathers and expecting fathers, I will never forget the moment I found out my wife was pregnant.  You might recall what you were doing, or where […]

The post Two Pink Lines appeared first on McAfee Blogs.

Read More Two Pink Lines

Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to dismantling systemic racism affecting marginalized groups and leading a peaceful movement to promote equality for all Americans, irrespective of color and creed. He leaves behind a legacy of courage, strength, perseverance, and a life-long dedication […]

The post Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community appeared first on McAfee Blogs.

Read More Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community

CES 2021

Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However, this year’s show was arguably more about technology catching up with how the COVID-19 pandemic has reshaped our lives. While gathering in person was not an option, we still had the opportunity to witness incredible […]

The post CES 2021: Highlights From the “Cleanest” Show Yet! appeared first on McAfee Blogs.

Read More CES 2021: Highlights From the “Cleanest” Show Yet!

As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the digital realm as it has in the physical world. From low level fraudsters leveraging the pandemic as a vehicle to trick victims into parting with money for non-existent PPE, to more capable actors using malware […]

The post A Year in Review: Threat Landscape for 2020 appeared first on McAfee Blogs.

Read More A Year in Review: Threat Landscape for 2020

Top gaming companies positioned to be next major cyberattack target After healthcare and higher education emerged as lucrative targets for cyberattacks in 2020, researchers have identified the video gaming industry as another key target. By scouring the dark web for stolen data belonging to any of the top 25 largest gaming firms, over a million […]

The post Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals appeared first on Webroot Blog.

Read More Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals

“It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for Nastiest Malware of 2020 (not to mention numerous headlines throughout the last year), was officially shut down in November of 2020. The ransomware group behind it […]

The post Maze Ransomware is Dead. Or is it? appeared first on Webroot Blog.

Read More Maze Ransomware is Dead. Or is it?

Top Cyber Security Threats to Look Out for in 2021 2020 was unexpectedly  defined by a global pandemic. Throughout the year, we have all had to figure out how to best live our lives online – from working from home to distance learning to digitally connecting with loved ones.  As 2020 comes to a close, we […]

The post Top Security Threats to Look Out for in 2021 appeared first on McAfee Blogs.

Read More Top Security Threats to Look Out for in 2021

The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector – the supply chain – that will continue to be exploited. The ever-increasing use of connected devices, apps and web services in our homes will also make us more susceptible to digital home break-ins. This threat […]

The post 2021 Threat Predictions Report appeared first on McAfee Blogs.

Read More 2021 Threat Predictions Report

If you???re looking to start or optimize an AppSec program in 2021, the Forrester WaveTM report is a good place to begin your research. The report not only details essential elements of AppSec solutions, but also ranks 12 static application security te…

Read More Veracode Named a Leader in The Forrester Wave: Static Application Security Testing, Q1 2021

Cyber security risk assessments are essential for organisations to protect themselves from malicious attacks and data breaches. After all, it’s only once you’re aware of the ways you’re vulnerable that you can put appropriate defences in place. But what exactly does a risk assessment do? Essentially, it helps you answer these three questions: Under what scenarios is your organisation under threat? How damaging would each of these scenarios be? How likely is it that these scenarios will occur? To complete a risk assessment, you must give each scenario that you identify a ‘risk score’ based on its potential damage and

The post A brief guide to cyber security risk assessments appeared first on IT Governance UK Blog.

Read More A brief guide to cyber security risk assessments

Organizations across the globe have quickly moved to a fast-digital transformation to allow a remote workforce model due to the global pandemic. That has naturally resulted in a multi-fold rise in the IT attack surface of a company.  That’s why security leaders should consider the added risks carried by the remote workforce as well as […]

The post To Which Risks Are A Remote Workforce Exposed? appeared first on CyberDB.

Read More To Which Risks Are A Remote Workforce Exposed?

And we’re finally home. After 8,441km of driving finished off by a comfy flight home whilst the car catches a ride on a carrier, we’re done. I talk about why we didn’t finish the drive in the latter part of this week’s video (basically boiled down to border uncertainties

Read More Weekly Update 225

This post was also written by Darragh McMahon At McAfee, we adhere to a set of core values and principles – We Put the Customer at The Core, We Achieve Excellence with Speed and Agility, We Play to Win or We Don’t Play, We Practice Inclusive Candor and Transparency. And reaching the ISO 27701 enshrines […]

The post McAfee Welcomes its ISO 27701 Certificate! appeared first on McAfee Blogs.

Read More McAfee Welcomes its ISO 27701 Certificate!

NIST’s Cybersecurity for the Internet of Things program has published a summary report—NISTIR 8322—for the July 2020 workshop on the creation of a Federal profile of IoT device cybersecurity requirements. The workshop provided the opportunity to discus…

Read More NIST publishes NISTIR 8322: Workshop Summary Report for “Building the Federal Profile for IoT Device Cybersecurity” Virtual Workshop