Changing the Conversation with Risk Quantification

“Quantitative risk analysis is the single most effective way to align security with business priorities and establish credibility with teams.” — U.S.-based CISO As organizations continue to leverage the latest technologies and move toward even greater interconnectivity in the pursuit of growth, business strategy and cybersecurity continue to converge. Cybersecurity concerns now extend beyond the […]

The post Changing the Conversation with Risk Quantification appeared first on Security Intelligence.

Continue reading Changing the Conversation with Risk Quantification

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season […]

The post 7 Holiday Cybersecurity Tips to Try Before The Year Ends appeared first on Security Intelligence.

Continue reading 7 Holiday Cybersecurity Tips to Try Before The Year Ends

IoT Security: Are Personal Devices Dragging Your Work Network Down?

How many connected devices have you added to your household since March 2020? Be sure to count fitness trackers, speakers, gaming machines and even your Tesla, if there’s one in your driveway. Were you one of the many people who waited months for a Peloton? Don’t overlook your new bike. Now add in all your […]

The post IoT Security: Are Personal Devices Dragging Your Work Network Down? appeared first on Security Intelligence.

Continue reading IoT Security: Are Personal Devices Dragging Your Work Network Down?

What is the impact of someone accidentally getting my IMEI number from my Android phone?

I have a concern regarding how risky it is if someone knows or has the copy of my 2 IMEI numbers. As we all know, on Android phones, the IMEI are at the back cover of the phone like a sticker.
So, my question is, what if someone intentiona… Continue reading What is the impact of someone accidentally getting my IMEI number from my Android phone?

What You Need to Know About Data Security Heading into 2022

Every business needs an effective data security strategy. Over the past year alone, 64% of companies worldwide faced some form of cyber attack, with an average cost of $4.24 million per breach — the highest ever recorded.  Modern enterprises must ensure that their systems can resist unauthorized access, stop data breaches and remain secure (while […]

The post What You Need to Know About Data Security Heading into 2022 appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Security Heading into 2022

OWASP Top 10 2021: The most serious web application security risks

The definitive OWASP Top 10 2021 list is out, and it shows that broken access control is currently the most serious web application security risk. How is the list compiled? “We get data from organizations that are testing vendors by trade, bug bo… Continue reading OWASP Top 10 2021: The most serious web application security risks

What are the risks of allowing general users to add printers to their company laptops?

I work for a company with a large user base. There is a requirement to allow users to add printers to their laptops e.g. when working from home.
What are the security risks?
Is their a bad actor can use a printer to hack the laptop?
Can a … Continue reading What are the risks of allowing general users to add printers to their company laptops?