Creating an Incident Response Checklist to Prepare for a Data Breach

When faced with an external attack or data breach, an organization is helpless unless it has an incident response plan firmly in place. The goal of such a plan is to minimize the damage of an attack, meaning that the recovery effort should take as little time as possible and avoid unnecessary costs, which include […]

The post Creating an Incident Response Checklist to Prepare for a Data Breach appeared first on Security Intelligence.

Continue reading Creating an Incident Response Checklist to Prepare for a Data Breach

No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education

Many organizations across multiple sectors are creating new collar job opportunities to embrace the skills of aspiring professionals who lack traditional four-year college degrees.

The post No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education appeared first on Security Intelligence.

Continue reading No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education

The Past, Present and Future of DNS Security

As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.

The post The Past, Present and Future of DNS Security appeared first on Security Intelligence.

Continue reading The Past, Present and Future of DNS Security

The Past, Present and Future of DNS Security

As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.

The post The Past, Present and Future of DNS Security appeared first on Security Intelligence.

Continue reading The Past, Present and Future of DNS Security

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.

The post Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.

The post Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

An advanced cyberattack can sink an entire company if it doesn’t put the proper lifeboats in place and foster collaboration between disparate departments.

The post Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks appeared first on Security Intelligence.

Continue reading Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

Poor Management of Security Certificates and Keys Leads to Preventable Outages

Despite significant progress in the area of security certificates, many organizations still suffer preventable outages, according to a recent study.

The post Poor Management of Security Certificates and Keys Leads to Preventable Outages appeared first on Security Intelligence.

Continue reading Poor Management of Security Certificates and Keys Leads to Preventable Outages

The Untapped Potential of Two-Factor Authentication

Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.

The post The Untapped Potential of Two-Factor Authentication appeared first on Security Intelligence.

Continue reading The Untapped Potential of Two-Factor Authentication