Security tips to support remote work due to the coronavirus

In response to the coronavirus (COVID-19) and related social distancing rules and guidelines, an ever-increasing number of companies are closing their offices and implementing work from home policies. For some workers and companies, remote work is alre… Continue reading Security tips to support remote work due to the coronavirus

Phishing attacks on the rise

It’s no surprise that phishing attacks remain among the most effective. By some estimates, phishing (specifically highly-targeted spear-phishing attacks) are how 91% of digital attacks are initiated. Even business and security leaders — tho… Continue reading Phishing attacks on the rise

Staffers gone bad or bad decisions — which should you worry about more?

Insider threats have been in the news quite a bit recently, but insider threats don’t always present themselves as a staffer who has gone bad and is stealing and selling secrets to competitors or other nations. While that does happen, a good… Continue reading Staffers gone bad or bad decisions — which should you worry about more?

The high risk of data loss associated with employees

The security threat from insiders is growing. Consider the most recent Verizon Data Breach Investigation Report (DBIR), which found that 20% of cybersecurity incidents and 15% of data breaches investigated within the Verizon DBIR originated from people… Continue reading The high risk of data loss associated with employees

Survey: There’s a divide between cyber security concerns and cyber security actions

When it comes to cyber security, U.S. businesses and citizens alike have plenty of concerns, but they may not know how to mitigate them. That observation is based on the third annual Cyber Report from property and casualty insurer Chubb (pdf), which fo… Continue reading Survey: There’s a divide between cyber security concerns and cyber security actions

Identity management is coming to the Internet of Things

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonably secured. Device makers will need to take the secure design and de… Continue reading Identity management is coming to the Internet of Things

Staff and IT leadership at odds over data security

It’s no secret that employees and contractors are one of the primary causes of enterprise security events. It’s not that most insiders who cause data breaches are malicious. They’re not. They may carelessly send a cleartext email that… Continue reading Staff and IT leadership at odds over data security

Good news, bad news: A look at the Cyber Incident and Breach Trends Report

The most recent Cyber Incident and Breach Trends Report from the Online Trust Alliance found that overall data breaches and exposed risks were down in 2018. That’s the good news. Unfortunately, the news didn’t stop there. According to the r… Continue reading Good news, bad news: A look at the Cyber Incident and Breach Trends Report