Starting at Home: Cybersecurity in the Hybrid Workplace

As people settle into the late stages of the pandemic, the hybrid workplace is not going anywhere. Therefore, the enterprise must address the increasing number of entry points into the network as more employees work remotely.  In 2021, 61% of malware directed at organizations targeted remote employees via cloud apps. Since the onset of the pandemic, […]

The post Starting at Home: Cybersecurity in the Hybrid Workplace appeared first on Security Intelligence.

Continue reading Starting at Home: Cybersecurity in the Hybrid Workplace

Cybersecurity Awareness: How Much Data Can An Attacker Get From an Employee ID?

Cyber awareness may seem fairly obvious, but it’s not always. For example, you would never post a photo of your driver’s license on Facebook, right? How about your company ID card? Then there’s that selfie you took at the office. Were you wearing your work badge? Not a good idea. Part of cybersecurity awareness is […]

The post Cybersecurity Awareness: How Much Data Can An Attacker Get From an Employee ID? appeared first on Security Intelligence.

Continue reading Cybersecurity Awareness: How Much Data Can An Attacker Get From an Employee ID?

The CISO and the C-Suite: How to Achieve Better Working Relations

As the workforce moved from the cubicle desk to the dining room table in 2020, cybersecurity suddenly became everyone’s concern. Focus turned to the chief information security officer (CISO). It’s their job to keep businesses running and secure. In many companies, that also meant juggling a move to a full digital transformation with effective remote […]

The post The CISO and the C-Suite: How to Achieve Better Working Relations appeared first on Security Intelligence.

Continue reading The CISO and the C-Suite: How to Achieve Better Working Relations

What Does The Great Resignation Mean for Data Security?

You may not realize it yet, but we’re living through the latest zeitgeist. It’s the Great Resignation. You may have heard it being tossed around the media or witnessed it firsthand, or even been a part yourself. Either way, it’s happening across the United States. And it affects data security as much as it affects […]

The post What Does The Great Resignation Mean for Data Security? appeared first on Security Intelligence.

Continue reading What Does The Great Resignation Mean for Data Security?

Security Awareness Training: Beyond Cliche Advice for Remote Workers

I’ve read what seems like a million articles on how to make security awareness training more effective for remote workers. And honestly, they all seem to say the same thing. Teach employees the basics and give them a list of things they should do to keep your data safe. Almost every article includes the same […]

The post Security Awareness Training: Beyond Cliche Advice for Remote Workers appeared first on Security Intelligence.

Continue reading Security Awareness Training: Beyond Cliche Advice for Remote Workers

Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs

Data breaches have been growing in numbers and scale, taking longer to detect and contain. The average total cost of a data breach is at its highest of 17 years, at $4.24 million. The year over year increase of 10% is the largest single year cost increase recorded in the last 7 years. IBM and […]

The post Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs appeared first on Security Intelligence.

Continue reading Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs

How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all kinds of cyberattacks that involve end-user devices and internet-based services. There’s just one big problem: it’s far, far too common for people to use text messaging […]

The post How to Fix the Big Problems With Two-Factor and Multifactor Authentication appeared first on Security Intelligence.

Continue reading How to Fix the Big Problems With Two-Factor and Multifactor Authentication

How the Rise of the Remote SOC Changed the Industry

What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working a success for their companies. While companies of all sizes are still working out the details of what the return to work looks like, the consensus […]

The post How the Rise of the Remote SOC Changed the Industry appeared first on Security Intelligence.

Continue reading How the Rise of the Remote SOC Changed the Industry

Avoiding Video Background Snafus: How to Hold Safe Meetings Online

Zoom mishaps have provided us with much comic relief while we’re trying to adjust to safe meetings online. We’ll never forget the lawyer who wasn’t really a cat and the boss who was a potato. Zoom backgrounds weren’t left out of the fun either. They gave us laughs, like the student who used Danny DeVito’s […]

The post Avoiding Video Background Snafus: How to Hold Safe Meetings Online appeared first on Security Intelligence.

Continue reading Avoiding Video Background Snafus: How to Hold Safe Meetings Online

Does Multifactor Authentication Keep Your Remote Workers Safe?

Your eight-character password can be cracked in about eight hours, using brute force attacks — even if you add in numbers, mix up the cases and throw in a special character or three. Odds are high that eight-hour window will soon be even shorter. To combat this, many companies added multifactor authentication (MFA) into their […]

The post Does Multifactor Authentication Keep Your Remote Workers Safe? appeared first on Security Intelligence.

Continue reading Does Multifactor Authentication Keep Your Remote Workers Safe?