Privileged Access Management: The Future of Cyber Resilience

Attacks against critical infrastructure and government agencies have been surging. Some attackers want to extort money; others intend to steal data. But the victims all have one thing in common: they need to be able to fend off attacks and recover so they can continue to perform their functions. That’s where cyber resilience comes in, […]

The post Privileged Access Management: The Future of Cyber Resilience appeared first on Security Intelligence.

Continue reading Privileged Access Management: The Future of Cyber Resilience

What Does The Great Resignation Mean for Data Security?

You may not realize it yet, but we’re living through the latest zeitgeist. It’s the Great Resignation. You may have heard it being tossed around the media or witnessed it firsthand, or even been a part yourself. Either way, it’s happening across the United States. And it affects data security as much as it affects […]

The post What Does The Great Resignation Mean for Data Security? appeared first on Security Intelligence.

Continue reading What Does The Great Resignation Mean for Data Security?

How to Avoid Smishing Attacks Targeting Subscription Service Users

If you’re anything like me, you used delivery more during the pandemic than before. Both getting food brought to my door and meal kit boxes mean people don’t have to mask up and go out to the grocery store. But threat actors know that, too. Recent scams take advantage of people signing up for more […]

The post How to Avoid Smishing Attacks Targeting Subscription Service Users appeared first on Security Intelligence.

Continue reading How to Avoid Smishing Attacks Targeting Subscription Service Users

Most Digital Attacks Today Involve Social Engineering

On May 14, the FBI marked a sobering milestone: the receipt of its six millionth digital crime complaint. It took just 14 months for the FBI’s Internet Crime Complaint Center (IC3) to reach its new threshold. Digital crime complaints are on the rise, and we have some ideas as to why. Check out what these […]

The post Most Digital Attacks Today Involve Social Engineering appeared first on Security Intelligence.

Continue reading Most Digital Attacks Today Involve Social Engineering

Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

When did you last change your work password? Was it when the system prompted you? When you were first hired? Or maybe the answer doesn’t matter. When it comes to password safety, old adages don’t always apply anymore. Let’s take a look at what today’s business password management really needs by focusing on the valuable […]

The post Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient appeared first on Security Intelligence.

Continue reading Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

5 Ways to Increase Password Safety

You make password decisions every week. Maybe you create a new account, reset a password or respond to a password change prompt. And each time you make a seemingly small or insignificant mistake in regard to password safety, such as not creating strong enough passwords or using the same password on multiple accounts, you increase […]

The post 5 Ways to Increase Password Safety appeared first on Security Intelligence.

Continue reading 5 Ways to Increase Password Safety

How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all kinds of cyberattacks that involve end-user devices and internet-based services. There’s just one big problem: it’s far, far too common for people to use text messaging […]

The post How to Fix the Big Problems With Two-Factor and Multifactor Authentication appeared first on Security Intelligence.

Continue reading How to Fix the Big Problems With Two-Factor and Multifactor Authentication

3 Myths About Threat Actors and Password Safety

You’ve seen the memes and the warnings on social media — answering questions about your life history is ruining your password safety. It’s giving the bad guys the information they need to figure out your passwords and get the answers to your security questions.  But is that true? Are people lurking on social media waiting […]

The post 3 Myths About Threat Actors and Password Safety appeared first on Security Intelligence.

Continue reading 3 Myths About Threat Actors and Password Safety

Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

In the last hour, I’ve used my phone to take pictures of my teenagers, spy on my dogs while I was out of the house, pay my electric bill and watch a funny video. Then, while buying some new dish towels (yet another use), I used my phone as an identity document without even realizing […]

The post Are Your Employees’ Old Phone Numbers Creating Vulnerabilities? appeared first on Security Intelligence.

Continue reading Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

In a world in which bad news dominates, social engineering scams that carry a promise of good news can be incredibly lucrative for cyber criminals.  In one recent example, fraudsters set up a phony job posting using a real recruiter as the contact person for the hiring process. Applicants hoping for a chance at the […]

The post Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work appeared first on Security Intelligence.

Continue reading Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work