Inadvertent Insider Threats Present a Unique Challenge to Organizations

While we may imagine inadvertent insider threats as careless people clicking on dodgy emails, this image needs to be updated to include a wide variety of poor security hygiene behaviors.

The post Inadvertent Insider Threats Present a Unique Challenge to Organizations appeared first on Security Intelligence.

Continue reading Inadvertent Insider Threats Present a Unique Challenge to Organizations

Introducing 1-Click NIST Password Standard Compliance & More

Introducing one-click NIST password standard compliance, user reporting which outlines users who are using compromised passwords, and root password detection to prevent users from using root passwords. Microsoft’s Active Directory is used widely … Continue reading Introducing 1-Click NIST Password Standard Compliance & More

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

Ex-Inspector General indicted for stealing data on 250k govt colleagues

Crime doesn’t pay, even if you have the audacity to try to sell your employer its own, free software and personal data on your own colleagues. Continue reading Ex-Inspector General indicted for stealing data on 250k govt colleagues

Top Email Security Threats of 2020 – How To Stop Them

As hackers’ methods become more sophisticated, the scale of email security breaches and the frequency at which they occur grow greater with each passing year. In 2019 alone, an estimated 2 billion unique email addresses, accompanied by over 21 mi… Continue reading Top Email Security Threats of 2020 – How To Stop Them

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government have increased dramatically over the last several years. What is it about municipal organizations and governments that makes them such attractive targets?

The post Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government appeared first on Security Intelligence.

Continue reading Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

We Need More Than Security Awareness to Combat Insider Threats

When I was new to this industry, I firmly believed that insider threats occurred because people didn’t know how to be safe online.

The post We Need More Than Security Awareness to Combat Insider Threats appeared first on Security Intelligence.

Continue reading We Need More Than Security Awareness to Combat Insider Threats

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The findings in the 2020 X-Force Threat Intelligence Index highlight the most common attack vectors, the evolution of ransomware and malware, the risks posed by inadvertent insiders and more.

The post X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020 appeared first on Security Intelligence.

Continue reading X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

In our release of the 2020 Cost of Insider Threats report, we cover details on the cost of insider threats by industry and the tools and activities that can help reduce the risk of insider threats.

The post Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report appeared first on Security Intelligence.

Continue reading Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

5 Cybersecurity Threats That Will Dominate 2020

At MixMode, we can’t help but imagine the flip side of all that potential. An increasingly connected cyber landscape means an increased number of potential targets for bad actors. New tech is exciting, but it’s often inherently vulnerable t… Continue reading 5 Cybersecurity Threats That Will Dominate 2020