5 common data security pitfalls — and how to avoid them

Data protection has come a long way. In previous years, it was considered a “nice to have” and a line item on the budget further down the page. Today, it’s top of mind for almost every CIO or CISO across all industries. Yet many organizations are caught in the crosshairs of cybersecurity challenges, often due […]

The post 5 common data security pitfalls — and how to avoid them appeared first on Security Intelligence.

Continue reading 5 common data security pitfalls — and how to avoid them

How to Protect and Secure Your Data in 10 Ways

Use this comprehensive list of strategies to help you safeguard your company’s data from threats and data breaches. Continue reading How to Protect and Secure Your Data in 10 Ways

Syxsense Unveils Novel Unified Endpoint Management Strategy

Syxsense now offers more IT and endpoint management functions, including mobile device management, automation, remediation and zero trust.
The post Syxsense Unveils Novel Unified Endpoint Management Strategy appeared first on TechRepublic.
Continue reading Syxsense Unveils Novel Unified Endpoint Management Strategy

Is Patching the Holy Grail of Cybersecurity?

A proactive approach to cybersecurity includes ensuring all software is up-to-date across assets. This also includes applying patches to close up vulnerabilities. This practice minimizes risk, as it eliminates outdated software versions in the process. Does this make patching a catch-all cybersecurity solution? While patching is an important component of cybersecurity, other security solutions and […]

The post Is Patching the Holy Grail of Cybersecurity? appeared first on Security Intelligence.

Continue reading Is Patching the Holy Grail of Cybersecurity?

Report: Too many enterprises have shadow IT – unlocked doors with no cameras

New report says far too many firms have too many IT assets they cannot see or aren’t using, with some Windows servers lacking endpoint protection and patch management.
The post Report: Too many enterprises have shadow IT – unlocked doors with no camer… Continue reading Report: Too many enterprises have shadow IT – unlocked doors with no cameras

Patch Management: Keep an Eye on App Software Updates

You likely use apps every day, from trivial games to important transactions like your banking. It can be easy to forget to update them. But all of the data flowing through those apps has an impact on security. It’s important to apply software updates and patch management best practices to them.  At the beginning of […]

The post Patch Management: Keep an Eye on App Software Updates appeared first on Security Intelligence.

Continue reading Patch Management: Keep an Eye on App Software Updates

Multiple ransomware gangs pounce on ‘PrintNightmare’ vulnerability

The so-called PrintNightmare vulnerability in Microsoft software is turning into a dream for ransomware gangs. For the second time this week, security researchers have warned that extortionists exploited the critical flaw in an attempt to lock files and shake down victims. It shows how, more than a month after Microsoft disclosed the bug and urged users to update their software, a new round of exploitation is under way against vulnerable organizations. A ransomware group dubbed Vice Society recently seized on the PrintNightmare bug to move through an unnamed victim’s network and attempt to steal sensitive data, Talos, Cisco’s threat intelligence unit, said Thursday. A day earlier, cybersecurity firm CrowdStrike said that hackers using another type of ransomware had tried to use PrintNightmare to infect victims in South Korea. Neither Talos nor CrowdStrike named the targeted organizations. The PrintNightmare vulnerability affects how Windows’ Print Spooler manages interactions between computers and printers. […]

The post Multiple ransomware gangs pounce on ‘PrintNightmare’ vulnerability appeared first on CyberScoop.

Continue reading Multiple ransomware gangs pounce on ‘PrintNightmare’ vulnerability

How the Best Defense Gets Better

Security starts before detection and response, but many organizations focus there first. Mature security teams understand the importance of identification and protection.  Establishing good cyber hygiene and taking proactive measures to secure themsel… Continue reading How the Best Defense Gets Better