Increase in Small DDoS Attacks Could Take Down VPNs

Data breaches and ransomware might hog the headlines, but don’t forget to pay attention to DDoS attacks. According to research from Neustar, DDoS attacks increased by 168% in Q4 2019 compared to the same period in 2018. However, despite a year ago or … Continue reading Increase in Small DDoS Attacks Could Take Down VPNs

COVID-19 Response: Following Best Telehealth Security Practices

The novel coronavirus COVID-19 pandemic has changed everything: where your employees work, how they work and even how they go to the doctor. To limit in-person interactions with medical staff and to help prevent the spread, people are being encouraged… Continue reading COVID-19 Response: Following Best Telehealth Security Practices

Risks to Digital Identities: A Q&A With Ted Shorter, CTO at Keyfactor

Here are a few tips to help organizations keep their digital identities secure during the COVID-19 crisis The COVID-19 pandemic has forced millions of workers to connect to corporate networks remotely. During this time, there have been warnings of an … Continue reading Risks to Digital Identities: A Q&A With Ted Shorter, CTO at Keyfactor

Using Mystery Novel Techniques to Track Down Cyberthreats

If you consider yourself a good sleuth who can predict the end of every Agatha Christie novel, you might have a knack for discovering the origins of cyberthreats.

The post Using Mystery Novel Techniques to Track Down Cyberthreats appeared first on Security Intelligence.

Continue reading Using Mystery Novel Techniques to Track Down Cyberthreats

Storage Is Your Data Lifecycle Weak Spot

Privacy regulations have put more emphasis on data security. When we talk about data security and privacy, it’s often discussed as though the protection covers everything equally. But all data isn’t equal; it needs to be treated differently in each st… Continue reading Storage Is Your Data Lifecycle Weak Spot

How Personality Influences Cybersecurity Behavior

In August 2019, ESET and The Myers-Briggs Company released preliminary findings of a fascinating study on the way personality types can influence cybersecurity behaviors. With just a snippet of the data available, it was possible that security awarene… Continue reading How Personality Influences Cybersecurity Behavior

Companies Don’t Trust Themselves With Zero Trust

Zero trust may be an ideal solution to an increasingly porous cybersecurity approach. So why aren’t more organizations trusting? Cybersecurity seems to be in the middle of a perfect storm. Data breaches and other cyberthreats are on the rise. Th… Continue reading Companies Don’t Trust Themselves With Zero Trust

Will Weak Passwords Doom the Internet of Things (IoT)?

Weak passwords can hurt any organization’s security efforts and make any device easily hackable, but could they also be the greatest point of failure for internet of things (IoT) security?

The post Will Weak Passwords Doom the Internet of Things (IoT)? appeared first on Security Intelligence.

Continue reading Will Weak Passwords Doom the Internet of Things (IoT)?

What We Can Learn From Cyber Resilient Leaders

What separates those organizations that are cyber resilient and those that aren’t? Accenture’s study tells us Organizations are spending a lot on their cybersecurity systems, so it makes sense that they think they are well-protected from c… Continue reading What We Can Learn From Cyber Resilient Leaders

Your Smartphone: Ground Zero for Cyberattacks

Your network was hacked. You search to find the vulnerability that led to the hack. Here’s a tip that might expedite that investigation: start with the mobile phones connected to your network. With increasing frequency, smartphones are ground zero for… Continue reading Your Smartphone: Ground Zero for Cyberattacks