Majority of business travelers have grave reservations about public WiFi security and the safety of their data. Of the 2,000 global business travelers surveyed by Carlson Wagonlit Travel, 65% were less than confident about using public WiFi networks. Read More
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Recent Imperva survey found that nearly half of security professionals said they could implement an insider attack if they wished to. Insider threats remains one of the top cybersecurity threats to businesses. Read More
With millions of employees working from home in a pandemic, sound cyber and data security practices are necessary for companies to safeguard data and protect themselves. Read More
The US Cyber Command is expecting the TrickBot botnet to be involved in election interference attempts, and is actively running persistent operations against it along with Microsoft. Read More
New survey shows many consumers would demand compensation and want to hold CEOs of the businesses directly responsible if ransomware attacks were to affect them. Read More
With the new European Commission tipped to put forward a comprehensive AI policy in the first 100 days of office, a German expert group has recently published a report on its position. Read More
Third party data breach struck Quest Diagnostics’ billing vendor which exposed patients’ sensitive information including social security numbers and medical information. Read More
IoT in the workplace has followed the same adoption path as BYOD, and these devices are constantly streaming out to the cloud. Do you know what they’re sharing? What are the unseen cybersecurity risks? Read More
Intelligent chatbots are growing in popularity as they can reduce potential system vulnerabilities by funneling communications through highly secure protocols. Read More
419 million Facebook users are vulnerable to phishing attacks, SIM swaps and spam with their phone numbers exposed through a number of online databases found without password protection. Read More