How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home

Technology has enabled employees to work from the office, from home and pretty much everywhere in between. Unfortunately, many employees still aren’t connecting to secure Wi-Fi, putting data at risk.

The post How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home appeared first on Security Intelligence.

Continue reading How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home

Why Cities Shouldn’t Pay Ransomware Criminals

Recent ransomware attacks on U.S. cities have revealed the exorbitant cost of recovering from a data breach. However, paying the ransom only empowers cybercriminals to continue their campaigns.

The post Why Cities Shouldn’t Pay Ransomware Criminals appeared first on Security Intelligence.

Continue reading Why Cities Shouldn’t Pay Ransomware Criminals

Practice Social Media Safety to Protect Both Personal and Enterprise Data

When it comes to social media safety, users are often unaware of the ramifications of their online posts. Many don’t realize they may be putting personal and even enterprise data at risk.

The post Practice Social Media Safety to Protect Both Personal and Enterprise Data appeared first on Security Intelligence.

Continue reading Practice Social Media Safety to Protect Both Personal and Enterprise Data

Why Zero Trust Is Critical to a Productive Mobile Workforce

Businesses undergoing digital transformation are adopting the zero trust model to help manage the flow of corporate data to mobile devices.

The post Why Zero Trust Is Critical to a Productive Mobile Workforce appeared first on Security Intelligence.

Continue reading Why Zero Trust Is Critical to a Productive Mobile Workforce

When Digital Identity and Access Management Meets Physical Security

If your identity and access management (IAM) and physical security initiatives are not working as one, your organization may be suffering from unnecessary grief — and increasing risk.

The post When Digital Identity and Access Management Meets Physical Security appeared first on Security Intelligence.

Continue reading When Digital Identity and Access Management Meets Physical Security

The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

This year, National Cyber Security Awareness Month focuses on a trifecta of themes: Own IT, Secure IT and Protect IT.

The post The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019 appeared first on Security Intelligence.

Continue reading The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat?

The post Why Deepfake Audio Technology Is a Real Threat to Enterprise Security appeared first on Security Intelligence.

Continue reading Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network

Reading Time: 3 minutes Network vulnerabilities can be found in the most unlikely places. That’s why companies should adopt zero trust security principles, even if they lack the resources to rebuild the network from scratch.

The post 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network appeared first on Security Intelligence.

Continue reading 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network