4 Best Free Online Security Tools for SMEs in 2020

Cyberattacks on small and midsized companies in 2019 cost $200,000 per company on average, mercilessly putting many of them out of business, says CNBC in its analysis of a recent Accenture report. In light of the global cybersecurity skills shortage, t… Continue reading 4 Best Free Online Security Tools for SMEs in 2020

Patch Tuesday Lowdown, October 2019 Edition

On Tuesday Microsoft issued software updates to fix almost five dozen security problems in Windows and software designed to run on top of it. By most accounts, it’s a relatively light patch batch this month. Here’s a look at the highlights. Continue reading Patch Tuesday Lowdown, October 2019 Edition

Spam In your Calendar? Here’s What to Do.

Many spam trends are cyclical: Spammers tend to switch tactics when one method of hijacking your time and attention stops working. But periodically they circle back to old tricks, and few spam trends are as perennial as calendar spam, in which invitations to click on dodgy links show up unbidden in your digital calendar application from Apple, Google and Microsoft. Here’s a brief primer on what you can do about it. Continue reading Spam In your Calendar? Here’s What to Do.

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

Continue reading Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

How to Know if Your Cybersecurity Tools Are Actually Working

Reading Time: 3 minutes It’s time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need.

The post How to Know if Your Cybersecurity Tools Are Actually Working appeared first on Security Intelligence.

Continue reading How to Know if Your Cybersecurity Tools Are Actually Working

What You Should Know About the Equifax Data Breach Settlement

Big-three credit bureau Equifax has reportedly agreed to pay at least $650 million to settle lawsuits stemming from a 2017 breach that let intruders steal personal and financial data on roughly 148 million Americans. Here’s a brief primer that attempts to break down what this settlement means for you, and what it says about the value of your identity. Continue reading What You Should Know About the Equifax Data Breach Settlement

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

It might be difficult to fathom how this isn’t already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Microsoft Azure and Office365 accounts to use multi-factor authentication. The move comes amid a noticeable uptick in phishing and malware attacks targeting CSP employees and contractors. Continue reading Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Canadian government regulators are using the country’s powerful new anti-spam law to pursue hefty fines of up to a million dollars against Canadian citizens suspected of helping to spread malicious software. Continue reading Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Here’s Why More Security Solutions Doesn’t Equal Better Security

Security data isn’t useful when it’s isolated in data silos. Organizations need a simplified ecosystem of integrated security solutions to keep up with the shifting threat landscape.

The post Here’s Why More Security Solutions Doesn’t Equal Better Security appeared first on Security Intelligence.

Continue reading Here’s Why More Security Solutions Doesn’t Equal Better Security

Android 7.0+ Phones Can Now Double as Google Security Keys

Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google’s various services. The company announced that all phones running Android 7.0 and higher can now be used as Security Keys, an additional authentication layer that helps thwart phishing sites and password theft. Continue reading Android 7.0+ Phones Can Now Double as Google Security Keys