Safeguarding the B2B sharing economy

Most people are familiar with business-to-consumer (B2C) sharing economy companies such as Uber, Airbnb, and DoorDash, but what you may not know is that this fast-growing, widely recognized business model is also being increasingly leveraged by busines… Continue reading Safeguarding the B2B sharing economy

At-rest encryption. Use SFTP log-in credentials to unlock/decrypt encrypted drive or folder on an Ubuntu Linux server

I have a simple file server running on a small Ubuntu machine that facilitates file sharing and 2 way folder syncing between my and my girlfriend’s 4 computers through SFTP over a private network.
The setup works great for this purpose. I … Continue reading At-rest encryption. Use SFTP log-in credentials to unlock/decrypt encrypted drive or folder on an Ubuntu Linux server

At-rest encryption. Use SFTP log-in credentials to access encrypted drive or folder

I have a simple file server running on a small Ubuntu machine that facilitates file sharing and 2 way folder syncing between my and my girlfriend’s computers through SFTP over a private network.
The setup works great for my purposes, and I… Continue reading At-rest encryption. Use SFTP log-in credentials to access encrypted drive or folder

Organizations lack basic cybersecurity practices to combat the growing tide of ransomware

Organizations are not equipped to defend against ransomware due to deficiencies in implementing and sustaining basic cybersecurity practices, including managing privileged administrator credentials and ensuring visibility of supply chain risk, an Axio … Continue reading Organizations lack basic cybersecurity practices to combat the growing tide of ransomware

Human hacking increased as apps and browsers moved completely to the cloud

Human hacking – phishing attacks across all digital channels – has dramatically increased in 2021. SlashNext released its first report showing a 51% increase in attacks compared to 2020, and increasingly these attacks are happening outside of email. “T… Continue reading Human hacking increased as apps and browsers moved completely to the cloud

Endpoint Management 1-Day Virtual Conference Now Available On Demand

Petri’s Endpoint Management 1-day virtual conference is now available to view on demand. At the end of last month, Petri hosted a full free day of learning, covering topics like how to manage devices using Microsoft Intune, how to deploy new hardware with Windows Autopilot, and managing security updates with Windows Update. The management of […] Continue reading Endpoint Management 1-Day Virtual Conference Now Available On Demand

Could a bad actor get hold of your credential sent via https if you are connect to their fake network?

Imagine this typical Fake WiFi scenario:
A bad actor creates a fake coffee shop Wifi and therefore is in full control of the network. An unsuspecting victim would connect to the Wifi and log in to their email password via an HTTPS website…. Continue reading Could a bad actor get hold of your credential sent via https if you are connect to their fake network?

The biggest problem with ransomware is not encryption, but credentials

With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has evolved into a mature ecosystem of Ransomware-as-a-Service (RaaS) providers lev… Continue reading The biggest problem with ransomware is not encryption, but credentials

2 million malicious emails bypassed secure email gateways in 12 months

Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted and how? The retail industry was targeted most, with the average employee in… Continue reading 2 million malicious emails bypassed secure email gateways in 12 months

Previous employees with access to corporate data remain a threat to businesses

Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to corporate data. This is according to A research by My1Login, which found few … Continue reading Previous employees with access to corporate data remain a threat to businesses