Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

Promote security awareness among your remote workforce and inform future training efforts by distributing tailored cybersecurity self-assessments to your employees.

The post Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce appeared first on Security Intelligence.

Continue reading Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Connecting remotely is about more than a strong Wi-Fi password and VPN. Be sure to understand and manage the risks of smart devices in your home to bolster personal and enterprise IoT security.

The post Lock Down Personal Smart Devices to Improve Enterprise IoT Security appeared first on Security Intelligence.

Continue reading Lock Down Personal Smart Devices to Improve Enterprise IoT Security

5 Security  Mistakes Your Remote Team is Making Right Now

Businesses across the globe are now facing a new reality: working from home. Secure remote access to company resources has never been more prevalent or more essential; teams are shifting from the office to their living rooms in droves to keep each oth… Continue reading 5 Security  Mistakes Your Remote Team is Making Right Now

Google data puts innocent man at the scene of a crime

The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant. Continue reading Google data puts innocent man at the scene of a crime

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been available since the 1990s, and it has served us well. Now, Rich Communication Services is here. What kinds of security vulnerabilities are associated with this new tech?

The post What Is Rich Communication Services? Breaking Down the Benefits and Security Risks appeared first on Security Intelligence.

Continue reading What Is Rich Communication Services? Breaking Down the Benefits and Security Risks