Security Awareness Training and How it Impacts Reported Suspicious Emails

It should not be a surprise, but 95 percent of breaches come through phishing attacks. Nothing more than a simple lure email lands in one of your users inboxes, they click it, and everything unravels from there.
The post Security Awareness Trainin… Continue reading Security Awareness Training and How it Impacts Reported Suspicious Emails

5G Security Challenges and Ways to Overcome Them

As the world waits for the introduction of 5G networks, the industry gears up to address the security challenges that may accompany 5G. The 5G networks would essentially promote the use of a huge number of interconnected devices, a tremendous increase… Continue reading 5G Security Challenges and Ways to Overcome Them

Identity Management Tool

The IT landscape is becoming more complex each day. There have never been so many IT resources that a single user needs access to, and what’s available in terms of web apps and cloud infrastructure can be overwhelming. Because a user’s iden… Continue reading Identity Management Tool

Patch your Cisco WebEx clients now!

Networking behemoth Cisco has issued critical patches found in two of its widely used software products as prone to remote hacking. Users of WebEx and Unified Computing System (UCS) Director are urged to patch their software as soon as possible. Adviso… Continue reading Patch your Cisco WebEx clients now!

Excel pivot table data leak leads to £120,000 fine for London council

A London council has been fined £120,000 for accidentally revealing the names of people who owned empty properties. An error that could have been avoided with a simple double-click.
The post Excel pivot table data leak leads to £120,000 fine… Continue reading Excel pivot table data leak leads to £120,000 fine for London council

20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. I will go through the five requirements and… Continue reading 20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Capture GDPR Consent and Sign GDPR Contracts with E-Signatures

On May 25, 2018, the General Data Protection Regulation (GDPR) becomes the main legal framework for data protection in the EU. Under the GDPR, EU citizens must consent to the processing of their personal data – and data controllers must meet str… Continue reading Capture GDPR Consent and Sign GDPR Contracts with E-Signatures

Businesses Invest Heavily toward ‘Secure by Design’ GDPR Requirement

Less than two months before the European Union enforces its stringent General Data Protection Regulation (GDPR), businesses are rushing to achieve compliance, procedurally and technologically.
The post Businesses Invest Heavily toward ‘Secure by D… Continue reading Businesses Invest Heavily toward ‘Secure by Design’ GDPR Requirement