How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all kinds of cyberattacks that involve end-user devices and internet-based services. There’s just one big problem: it’s far, far too common for people to use text messaging […]

The post How to Fix the Big Problems With Two-Factor and Multifactor Authentication appeared first on Security Intelligence.

Continue reading How to Fix the Big Problems With Two-Factor and Multifactor Authentication

FragAttacks: Everything You Need to Know

A cybersecurity researcher discovered a new category of Wi-Fi vulnerabilities recently. But the surprising news is that this new category is actually very old. Called FragAttacks, these 12 Wi-Fi vulnerabilities have existed since the late 90s. But they’re new to the cybersecurity world because people only recently discovered and described them. Researchers unveiled the details on May […]

The post FragAttacks: Everything You Need to Know appeared first on Security Intelligence.

Continue reading FragAttacks: Everything You Need to Know

Cybersecurity Tips for Business Travelers: Best Practices for 2021

As we emerge from the pandemic, organizations will confront a new world of business travel and a new world of cybersecurity tips for travelers. What has changed? What hasn’t changed?  The particular cybersecurity risks and threats that might face business travelers are, of course, always evolving. But during 2020 and 2021, most of our business […]

The post Cybersecurity Tips for Business Travelers: Best Practices for 2021 appeared first on Security Intelligence.

Continue reading Cybersecurity Tips for Business Travelers: Best Practices for 2021

Cyber Gangs: Who Are They in 2021 and What Do They Want?

Cyber crime gangs have been operating for years, but in recent months, they’ve shifted tactics. They’ve embraced new technologies, exploited new opportunities, delivered new payloads and sought out new targets. Their aim is to maximize the amount of money they can collect through cyber crime. Gangs, such as Cosmic Lynx, Exaggerated Lion, Fin7 and Florentine […]

The post Cyber Gangs: Who Are They in 2021 and What Do They Want? appeared first on Security Intelligence.

Continue reading Cyber Gangs: Who Are They in 2021 and What Do They Want?

Why the Worst Cloud Security Predictions Might Not Come True

We’ve all heard dire predictions about the future of cybersecurity trends, especially cloud security. Internet of things (IoT) environments will expand the attack surface beyond control and encourage breaches. Hybrid offices will always pose a greater risk as cyber criminals exploit flex and remote work. Insecure application programming interfaces (APIs) will open the door to […]

The post Why the Worst Cloud Security Predictions Might Not Come True appeared first on Security Intelligence.

Continue reading Why the Worst Cloud Security Predictions Might Not Come True

IoT Security: Thieves Are Targeting Smart Cameras — Here’s How To Stop Them

Among the many important aspects of Internet of things (IoT) security, live cameras are one of the most open to misuse. People have been video snooping, watching private cameras and doing other sketchy things around connected cameras for many years. But in recent months, the intensity and risk around video have risen. Video has breached […]

The post IoT Security: Thieves Are Targeting Smart Cameras — Here’s How To Stop Them appeared first on Security Intelligence.

Continue reading IoT Security: Thieves Are Targeting Smart Cameras — Here’s How To Stop Them

Cloud Security: Why Being Intentional in Encryption Matters

Cloud security and web application security demand technology and practices that protect applications and data hosted remotely. Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud data, of course, are privacy, security and regulatory compliance — all standard for any successful enterprise. At the bottom of all this is the idea […]

The post Cloud Security: Why Being Intentional in Encryption Matters appeared first on Security Intelligence.

Continue reading Cloud Security: Why Being Intentional in Encryption Matters

IoT Security: Why Food Industry Cyber Awareness Should Be Your Main Ingredient

The food industry faces an uncertain future. Restaurants and prepared-food companies, food manufacturers, farmers and producers that survived the lockdowns of 2020 and 2021 are heading into a new world. Some of the competition has been removed, new players are entering the market and both tastes and consumer habits have changed. Take a look at […]

The post IoT Security: Why Food Industry Cyber Awareness Should Be Your Main Ingredient appeared first on Security Intelligence.

Continue reading IoT Security: Why Food Industry Cyber Awareness Should Be Your Main Ingredient

How to Boost Your Health Care Data Cybersecurity Immune System

Health care data security has always been a concern. But in the last year, health care and digital safety have become even more urgent topics in government, business and in the public at large. The reason is the sudden and enormous rise in attacks, both in number and impact. Where are those health care cyberattacks […]

The post How to Boost Your Health Care Data Cybersecurity Immune System appeared first on Security Intelligence.

Continue reading How to Boost Your Health Care Data Cybersecurity Immune System

IoT Security: Be Aware of What You Connect at Home

Home IoT device adoption has grown by leaps and bounds. It’s a time of connected gadgets everywhere, and with them, comes security risks. McKinsey predicts the total number of IoT-connected devices will be 43 billion by 2023, with the vast majority being consumer devices. Most of these new devices connect via home routers (another IoT […]

The post IoT Security: Be Aware of What You Connect at Home appeared first on Security Intelligence.

Continue reading IoT Security: Be Aware of What You Connect at Home