Password Safety: Rethink Your Strong Password

“Use longer, stronger passwords.” This is a directive we’ve been accustomed to hearing for decades. Many of us are using strong passwords with a combination of uppercase letters, lowercase letters, numbers and special characters. The speed at which threat actors can brute force our long passwords has ramped up.  In a brute force password attack, […]

The post Password Safety: Rethink Your Strong Password appeared first on Security Intelligence.

Continue reading Password Safety: Rethink Your Strong Password

Social Engineering And Social Media: How to Stop Oversharing

You’ve done your due diligence, practice good security hygiene and have the best security tools available. Now, your security posture is strong. But, your plan is only as good as your employees, and they may be letting you down when it comes to being ready for social engineering.   While employees clicking on phishing links still […]

The post Social Engineering And Social Media: How to Stop Oversharing appeared first on Security Intelligence.

Continue reading Social Engineering And Social Media: How to Stop Oversharing

Cybersecurity Trends: Keeping Up With 2020’s ‘New Normal’

This year has seen major changes in cybersecurity trends. At times, 2020 seems to have come and gone in a flash. For many, it has dragged on for what seems to be years and years. Data breaches, new threats to education, the new normal of working from home (WFH), new malware styles and pandemic-related attacks […]

The post Cybersecurity Trends: Keeping Up With 2020’s ‘New Normal’ appeared first on Security Intelligence.

Continue reading Cybersecurity Trends: Keeping Up With 2020’s ‘New Normal’

Cybersecurity Awareness: 6 Myths And How To Combat Them

National Cybersecurity Awareness month is upon us. And, so is the opportunity to look at what common C-suite misconceptions could be handcuffing security awareness efforts.  As we enter the back half of 2020, now is the time to look at myths and highlight their relevancy in this chaotic year. Which myths are in the modern threat landscape? […]

The post Cybersecurity Awareness: 6 Myths And How To Combat Them appeared first on Security Intelligence.

Continue reading Cybersecurity Awareness: 6 Myths And How To Combat Them

Creating a Cybersecurity Culture Starts With Your Team

As cyberattacks become more prevalent and sophisticated, companies must put more faith in their employees to make sure they don’t put data at risk or fall victim to ransomware. But, employees are busier than ever. And, creating a cybersecurity culture at work becomes both more important and more challenging when employees work at home. Creating […]

The post Creating a Cybersecurity Culture Starts With Your Team appeared first on Security Intelligence.

Continue reading Creating a Cybersecurity Culture Starts With Your Team

How Can Enterprise Protect Personally Identifiable Information?

With data breaches often appearing in the news, customers and enterprise leaders alike may be concerned that the enterprise isn’t doing enough to protect customers’ personally identifiable infomation (PII). As today’s chaotic economy makes for a hungry threat landscape, what methods can the enterprise apply to better protect the increased PII data flow? In some […]

The post How Can Enterprise Protect Personally Identifiable Information? appeared first on Security Intelligence.

Continue reading How Can Enterprise Protect Personally Identifiable Information?

Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away

Shellshock is a bug in the Bash command-line interface shell that has existed for 30 years and was discovered as a significant threat in 2014. Today, Shellshock still remains a threat to enterprise.   The threat is certainly less risky than in the year of discovery. However, in a year in which security priorities have […]

The post Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away appeared first on Security Intelligence.

Continue reading Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away

Why Cyber Ranges Are Effective To Train Your Teams

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that test multiple dimensions and stakeholders within diverse environments. Cybersecurity teams can use cyber ranges to practice defending against simulated threats in immersive training scenarios, essentially preparing and rehearsing […]

The post Why Cyber Ranges Are Effective To Train Your Teams appeared first on Security Intelligence.

Continue reading Why Cyber Ranges Are Effective To Train Your Teams

Zero Trust in 2020: More Important Than Ever Before

In a perfect world, all organizations would implement Zero Trust for its inherent security benefits. In today’s uncertain environment, every security strategy that mitigates risk is critical, and the role of Zero Trust is even more relevant in the work-from-home era. By nature, employees’ home environments are more vulnerable with a higher likelihood of compromise. […]

The post Zero Trust in 2020: More Important Than Ever Before appeared first on Security Intelligence.

Continue reading Zero Trust in 2020: More Important Than Ever Before

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift will be required to maintain cyber resilience.

The post Shift Your Cybersecurity Mindset to Maintain Cyber Resilience appeared first on Security Intelligence.

Continue reading Shift Your Cybersecurity Mindset to Maintain Cyber Resilience