Securing Your Remote Workforce: How to Reduce Cyber Threats

The debates have (mostly) stopped about whether remote work is here to stay. For many people, it’s just the way we work today. However, even three years later, cybersecurity around remote work is still a top concern. Both companies and employees have room for improvement in terms of protecting devices, data and apps from cybersecurity […]

The post Securing Your Remote Workforce: How to Reduce Cyber Threats appeared first on Security Intelligence.

Continue reading Securing Your Remote Workforce: How to Reduce Cyber Threats

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience.  Many companies must now protect their systems from more sophisticated threats […]

The post Six Ways to Secure Your Organization on a Smaller Budget appeared first on Security Intelligence.

Continue reading Six Ways to Secure Your Organization on a Smaller Budget

OneNote, Many Problems? The New Phishing Framework

There are plenty of phish in the digital sea, and attackers are constantly looking for new bait that helps them bypass security perimeters and land in user inboxes. Their newest hook? OneNote documents. First noticed in December 2022, this phishing framework has seen success in fooling multiple antivirus (AV) tools by using .one file extensions, […]

The post OneNote, Many Problems? The New Phishing Framework appeared first on Security Intelligence.

Continue reading OneNote, Many Problems? The New Phishing Framework

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network […]

The post How to Solve the People Problem in Cybersecurity appeared first on Security Intelligence.

Continue reading How to Solve the People Problem in Cybersecurity

A Response Guide for New NSA and CISA Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently published a report highlighting a range of critical security vulnerabilities requiring attention from organizations of all types. The report was published with input from the National Security Agency (NSA) and similar agencies worldwide. It should be considered essential reading.  Many of the vulnerabilities in the report are […]

The post A Response Guide for New NSA and CISA Vulnerabilities appeared first on Security Intelligence.

Continue reading A Response Guide for New NSA and CISA Vulnerabilities

Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line

In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become more high-tech, the gap between ‘the cyber 1%’ and those companies below the ‘cybersecurity poverty line’ grows wider. That poses a threat to all companies.  What is the cyber poverty […]

The post Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line appeared first on Security Intelligence.

Continue reading Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line

Everything CISOs Need to Know About NIST

It’s never been harder to be a chief information security officer (CISO). In 2021, there were 50% more attacks each week compared to 2020. Without a plan, maintaining a robust security posture is an uphill struggle.  Thankfully, the National Institute of Standards and Technology (NIST) offers CISOs the guidance they need. Read on to learn […]

The post Everything CISOs Need to Know About NIST appeared first on Security Intelligence.

Continue reading Everything CISOs Need to Know About NIST

U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed DarkSide, which has since shut down, as the threat actors. What’s changed about U.S. cyber […]

The post U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack appeared first on Security Intelligence.

Continue reading U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

What Online Gaming Cheats Teach Us About Cybersecurity

When you play a video game, you probably want to win, or at least show off real skill. Cheaters make it a lot less fun, according to a recent Irdeto Global Gaming Survey. It says 60% of all online video game players across the globe have had their gaming time negatively impacted by cheaters. These […]

The post What Online Gaming Cheats Teach Us About Cybersecurity appeared first on Security Intelligence.

Continue reading What Online Gaming Cheats Teach Us About Cybersecurity

Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today

“The End of the World!?!” That’s what the cover of TIME Magazine said for its January 18, 1999 issue.  Over two decades ago, the industrialized world was gripped by panic over the so-called Y2K bug. Also called the Millennium Bug, the year 2000 problem, Y2K problem, the Y2K glitch and other labels, some feared the […]

The post Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today appeared first on Security Intelligence.

Continue reading Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today