Avoiding Video Background Snafus: How to Hold Safe Meetings Online

Zoom mishaps have provided us with much comic relief while we’re trying to adjust to safe meetings online. We’ll never forget the lawyer who wasn’t really a cat and the boss who was a potato. Zoom backgrounds weren’t left out of the fun either. They gave us laughs, like the student who used Danny DeVito’s […]

The post Avoiding Video Background Snafus: How to Hold Safe Meetings Online appeared first on Security Intelligence.

Continue reading Avoiding Video Background Snafus: How to Hold Safe Meetings Online

AI Security Threats: The Real Risk Behind Science Fiction Scenarios

We often hear about the positive aspects of artificial intelligence (AI) security — the way it can predict what customers need through data and deliver a custom result. When the darker side of AI is discussed, the conversation often centers on data privacy. Other conversations in this area veer into science fiction where the AI works […]

The post AI Security Threats: The Real Risk Behind Science Fiction Scenarios appeared first on Security Intelligence.

Continue reading AI Security Threats: The Real Risk Behind Science Fiction Scenarios

Private LTE or 5G: Which Is More Secure?

Employees using mobile devices for work is nothing new. From health care workers using them for patient care to a salesperson checking work email in an airport, most of us have our phones on us at all times. However, the increase in the number of remote workers due to the COVID-19 pandemic has ramped up […]

The post Private LTE or 5G: Which Is More Secure? appeared first on Security Intelligence.

Continue reading Private LTE or 5G: Which Is More Secure?

Adopting Microsegmentation Into Your Zero Trust Model, Part 3

This is the third and final part in a series on zero trust and microsegmentation. Be sure to check out Parts 1 and 2. The customer relationship used to be circular — you marketed your products to customers, they purchased products, your company provided customer service as needed and then you marketed additional products to […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 3 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 3

3 Ways to Reduce the Cost of a Government Data Breach

As a government agency or jurisdiction, one of your goals is to build trust with the citizens you serve. You earn that trust by protecting their information from a government data breach. This also helps by making efficient use of taxpayer dollars. When a data breach does hit, both pillars are eroded. Your organization can […]

The post 3 Ways to Reduce the Cost of a Government Data Breach appeared first on Security Intelligence.

Continue reading 3 Ways to Reduce the Cost of a Government Data Breach

Does Multifactor Authentication Keep Your Remote Workers Safe?

Your eight-character password can be cracked in about eight hours, using brute force attacks — even if you add in numbers, mix up the cases and throw in a special character or three. Odds are high that eight-hour window will soon be even shorter. To combat this, many companies added multifactor authentication (MFA) into their […]

The post Does Multifactor Authentication Keep Your Remote Workers Safe? appeared first on Security Intelligence.

Continue reading Does Multifactor Authentication Keep Your Remote Workers Safe?

Adopting Microsegmentation Into Your Zero Trust Model, Part 2

This is the second part in a series on zero trust and microsegmentation. Be sure to check out Part 1 here. Organizations are increasingly using a zero trust approach combined with microsegmentation to carefully balance the needs of security and access. Companies work with most vendors on a purely transactional basis — those vendors simply […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 2 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 2

Alert Fatigue: How AI Can Help You Address Your Most Important Alerts

When someone says the word hurricane, I hear the shrill weather-alert warning sound in my head. Having grown up in Florida and now living in North Carolina, I’ve been through many hurricanes and have the routine down — stock up on supplies and hurricane snacks, bring in the patio furniture, fill up the cars with […]

The post Alert Fatigue: How AI Can Help You Address Your Most Important Alerts appeared first on Security Intelligence.

Continue reading Alert Fatigue: How AI Can Help You Address Your Most Important Alerts

Why Data Monopolies Mean Breaches Hit Harder (And How to Help)

Tech companies aren’t shy about how much they know about us. In fact, it’s right in my face every time I log on to my accounts: advertisements for running shoes I looked at online last week; condo rentals for the post-pandemic trip I’ve been quietly planning for months; and recommended dachshund Facebook groups likely based […]

The post Why Data Monopolies Mean Breaches Hit Harder (And How to Help) appeared first on Security Intelligence.

Continue reading Why Data Monopolies Mean Breaches Hit Harder (And How to Help)

3 Ransomware Threats in 2021 and How to Protect Against Them

I’m sure I’m not the only one who expected the world to magically get back to normal — whatever that is — when the ball dropped on 2021. After seeing a rise in threats last year, no more ransomware, or at least fewer attacks, was on my very long wish list for a wonderful new […]

The post 3 Ransomware Threats in 2021 and How to Protect Against Them appeared first on Security Intelligence.

Continue reading 3 Ransomware Threats in 2021 and How to Protect Against Them