Is Blockchain the Key to Stopping Ransomware Attacks?

Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack.

The post Is Blockchain the Key to Stopping Ransomware Attacks? appeared first on Security Intelligence.

Continue reading Is Blockchain the Key to Stopping Ransomware Attacks?

Best Practices for Deploying StorSimple Virtual Arrays

Microsoft's VMworld 2013 custard truck/Hyper-V guerrilla marketing vehicle

Aidan Finn looks at some of the best practices for using the StorSimple 1200 virtual appliance.

The post Best Practices for Deploying StorSimple Virtual Arrays appeared first on Petri.

Continue reading Best Practices for Deploying StorSimple Virtual Arrays

Nine Security Practices That May Not Be Effective

Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.

The post Nine Security Practices That May Not Be Effective appeared first on Security Intelligence.

Continue reading Nine Security Practices That May Not Be Effective

Nine Security Tips That Go Outside the Box

Even the most basic security measures can go a long way toward thwarting cybercrime. Use these simple yet effective security tips to protect your network.

The post Nine Security Tips That Go Outside the Box appeared first on Security Intelligence.

Continue reading Nine Security Tips That Go Outside the Box

Perspectives on Securing Mobile and Social Business, 12 Months On

The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.

The post Perspectives on Securing Mobile and Social Business, 12 Months On appeared first on Security Intelligence.

Continue reading Perspectives on Securing Mobile and Social Business, 12 Months On

Perspectives on Securing Mobile and Social Business, 12 Months On

The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.

The post Perspectives on Securing Mobile and Social Business, 12 Months On appeared first on Security Intelligence.

Continue reading Perspectives on Securing Mobile and Social Business, 12 Months On

Hacked for the Holidays: When You’re Asked to Fix the Family Computer

If you’re an IT professional, you’ll likely be tapped to fix the family computer this holiday season. Leave your loved ones with these online safety tips.

The post Hacked for the Holidays: When You’re Asked to Fix the Family Computer appeared first on Security Intelligence.

Continue reading Hacked for the Holidays: When You’re Asked to Fix the Family Computer

Online Safety Tips for NCSAM: Lessons From Week One

In the spirit of National Cyber Security Awareness Month (NCSAM), the EveryApp team offers seven basic tips for online safety.

The post Online Safety Tips for NCSAM: Lessons From Week One appeared first on Security Intelligence.

Continue reading Online Safety Tips for NCSAM: Lessons From Week One

Malvertising: Coming to a Website Near You

Advertising enables free content. Without online advertising, many publishers would be forced to charge users through subscriptions or other methods of payment to view their content. On the flip side, it’s a way for companies to promote new services, products and discounts. But advertising is also becoming increasingly attractive to cybercriminals as a vehicle for […]

The post Malvertising: Coming to a Website Near You appeared first on Security Intelligence.

Continue reading Malvertising: Coming to a Website Near You