Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world’s largest banks.

The post Why You Should Be Worried About London Blue’s Business Email Compromise Attacks appeared first on Security Intelligence.

Continue reading Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising?

Malvertising is one more threat that will keep your IT decision-makers up at night, but any company with a protection-first mindset should be able to remain ahead of the curve.

The post What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising? appeared first on Security Intelligence.

Continue reading What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising?

Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask

With blazing fast speeds and lower latency, will 5G technology mitigate or exacerbate existing network security concerns?

The post Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask appeared first on Security Intelligence.

Continue reading Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask

We Need to Talk About NIST’s Dropped Password Management Recommendations

NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.

The post We Need to Talk About NIST’s Dropped Password Management Recommendations appeared first on Security Intelligence.

Continue reading We Need to Talk About NIST’s Dropped Password Management Recommendations

6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts

To improve the company’s overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths.

The post 6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts appeared first on Security Intelligence.

Continue reading 6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts

Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it’s crucial to establish network security policies for your home IT just as you would at work.

The post Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home appeared first on Security Intelligence.

Continue reading Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

What Are the Risks and Rewards Associated With AI in Healthcare?

While the use of AI in healthcare promises to improve visibility and implementation, there are serious risks associated with the emerging technology if misused by staff or abused by threat actors.

The post What Are the Risks and Rewards Associated With AI in Healthcare? appeared first on Security Intelligence.

Continue reading What Are the Risks and Rewards Associated With AI in Healthcare?

Legal AI: How Machine Learning is Aiding — and Concerning — Law Practitioners

Law firms tasked with analyzing mounds of data can vastly improve their efficiency by using legal AI tools.

The post Legal AI: How Machine Learning is Aiding — and Concerning — Law Practitioners appeared first on Security Intelligence.

Continue reading Legal AI: How Machine Learning is Aiding — and Concerning — Law Practitioners

Managing Enterprise Security Risk on Vacation

Enterprise data and devices require additional safeguarding wherever your employee takes them — especially on vacation. Some basic user education can greatly reduce security risk.

The post Managing Enterprise Security Risk on Vacation appeared first on Security Intelligence.

Continue reading Managing Enterprise Security Risk on Vacation

How Will Healthcare Cybersecurity Issues Impact Acquisitions?

Healthcare cybersecurity is now the primary concern during acquisitions in this expanding industry. Business owners can take proactive steps to secure digital infrastructure before issues arise.

The post How Will Healthcare Cybersecurity Issues Impact Acquisitions? appeared first on Security Intelligence.

Continue reading How Will Healthcare Cybersecurity Issues Impact Acquisitions?