Does Multifactor Authentication Keep Your Remote Workers Safe?

Your eight-character password can be cracked in about eight hours, using brute force attacks — even if you add in numbers, mix up the cases and throw in a special character or three. Odds are high that eight-hour window will soon be even shorter. To combat this, many companies added multifactor authentication (MFA) into their […]

The post Does Multifactor Authentication Keep Your Remote Workers Safe? appeared first on Security Intelligence.

Continue reading Does Multifactor Authentication Keep Your Remote Workers Safe?

Social Engineering: Watch Out for These Threats Against Cybersecurity Experts

Many of us remember our parents saying not to take candy from strangers. Today, we can apply a similar mindset to avoid social engineering.  Social engineering is the threat that keeps on coming back. Threat actors are learning to use even cybersecurity researchers’ best intentions against them. Let’s take a look at tactics threat actors use to target […]

The post Social Engineering: Watch Out for These Threats Against Cybersecurity Experts appeared first on Security Intelligence.

Continue reading Social Engineering: Watch Out for These Threats Against Cybersecurity Experts

Is Multifactor Authentication Changing the Threat Landscape?

Changes to the cybersecurity threat landscape are constant and dynamic: threat actor groups come and go, alter tactics, techniques and procedures (TTPs) and adjust to new defensive mechanisms. Over time, both cyber criminal gangs and nation-state actors endure arrests and swap individuals in what can appear to be an ongoing arms race between good and […]

The post Is Multifactor Authentication Changing the Threat Landscape? appeared first on Security Intelligence.

Continue reading Is Multifactor Authentication Changing the Threat Landscape?

Progressive Web Apps and Cookies: Taking a Bite Out of Security

To prevent cookie theft, have cyber defense baked in. With progressive web apps (PWA) and other relatively new protective efforts in place, how can you be sure you’re defending against today’s attackers? Here’s what enterprise needs to know about the rumbling threat of pass-the-cookie attacks, how current cloud and mobile frameworks like PWAs can empower […]

The post Progressive Web Apps and Cookies: Taking a Bite Out of Security appeared first on Security Intelligence.

Continue reading Progressive Web Apps and Cookies: Taking a Bite Out of Security

Cookie Hijacking: More Dangerous Than it Sounds

Multifactor authentication (MFA) is a great way to prevent threat actors from using stolen credentials to access your network. But with remote work becoming the norm and the attack surface widening with more apps, devices and systems connecting than ever before, threat actors are working overtime to beat MFA. Cookie hijacking in particular is a […]

The post Cookie Hijacking: More Dangerous Than it Sounds appeared first on Security Intelligence.

Continue reading Cookie Hijacking: More Dangerous Than it Sounds

Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

As hospitals get smarter, threat actors have more routes inside. IBM’s recent research on the health care industry shows how smart tools, which could be very valuable for today’s medical facilities, also need healing of their own. What should hospital IT security teams look out for? Our overview of the state of cybersecurity in the health […]

The post Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond appeared first on Security Intelligence.

Continue reading Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

Top 10 Cybersecurity Vulnerabilities of 2020

What cybersecurity vulnerabilities new and old should organizations look out for this year? Let IBM X-Force be your guide to today’s top cybersecurity threats with this detailed report. First, scanning for and exploiting vulnerabilities emerged as the top infection vector of 2020, according to the 2021 X-Force Threat Intelligence Index. In other words, attackers are […]

The post Top 10 Cybersecurity Vulnerabilities of 2020 appeared first on Security Intelligence.

Continue reading Top 10 Cybersecurity Vulnerabilities of 2020

5 Ways Companies Can Protect Personally Identifiable Information

Protecting personally identifiable information (PII) is one of the key aspects of a security expert’s job. What does personally identifiable information include? Social Security numbers, birth dates and places, financial accounts and more can give threat actors a foothold to identify someone or steal their money or identity. This data could also be used to […]

The post 5 Ways Companies Can Protect Personally Identifiable Information appeared first on Security Intelligence.

Continue reading 5 Ways Companies Can Protect Personally Identifiable Information

How Doxing Affects Gen Z

In the past, public and famous figures had to worry most about doxing. Two men were arrested in New York for doxing after posting home addresses and Social Security numbers of dozens of law enforcement personnel on the internet. Last year, federal prosecutors sentenced a former Senate aide for releasing personal information online about five […]

The post How Doxing Affects Gen Z appeared first on Security Intelligence.

Continue reading How Doxing Affects Gen Z

Consider the Human Angle in Your Threat Modeling

When it comes to threat modeling, many businesses plan as if there were only a few possible scenarios in which cybersecurity or privacy-related incidents could occur. We need to plan for more cybersecurity hazards than just basic social engineering, insider threats and product vulnerabilities. Both our businesses and our customers face threats that are messier than […]

The post Consider the Human Angle in Your Threat Modeling appeared first on Security Intelligence.

Continue reading Consider the Human Angle in Your Threat Modeling