Tag: security

7 Cybersecurity tips for small businesses - especially those with remote workers

7 Cybersecurity tips for small businesses – especially those with remote workers

Small businesses have been facing a mountain of problems since the coronavirus outbreak took hold of the world’s economy and shifted most people to working from home. Millions of small businesses around the world, which previously had no experience dealing with cybersecurity, suddenly had to deal with a deluge of new issues, ranging from which…
Read more

Cybersecurity Lawyer Who Flagged The WHO Hack Warns Of 'Massive' Remote Work Risks

Cybersecurity Lawyer Who Flagged The WHO Hack Warns Of ‘Massive’ Remote Work Risks

Cybersecurity – Large numbers of companies are rolling out mandatory work-from-home policies to help limit the risks posed by the coronavirus outbreak. But cybersecurity experts warn that those remote setups invite new hacking risks. The Federal Bureau of Investigation recently issued warnings of an uptick in fraudulent crimes tied to the coronavirus, particularly by scammers…
Read more

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

Cybersecurity in the times of coronavirus: Here’s how to stay safe

Cybersecurity – As more people are opting to work from home due to the coronavirus outbreak, they are also coming in the crosshairs of cyber attackers out to make a quick buck. In fact, Cybersecurity researchers are now warning that hackers may target the large workforce forced to work from home in the time of…
Read more

How To Prepare Your Employees For Today's Cybersecurity Threats

How To Prepare Your Employees For Today’s Cybersecurity Threats

When you look at the nature of cybersecurity and the evolving threats out there, there are essentially two “doors” that malicious actors will use to gain entry to your environment and data. Door one is your technology. Cyberattackers exploit vulnerabilities in your technology infrastructure and security tools to either sneak through surreptitiously or blow open…
Read more

Get Off The Dysfunctional Cybersecurity Merry-Go-Round

Get Off The Dysfunctional Cybersecurity Merry-Go-Round

Cybersecurity – You’ve probably heard the phrase, “If it ain’t broke, don’t fix it.” It is generally used to rationalize not taking proactive action to address issues if something seems to be at least partly functional. The logical flipside, though, is “If it’s broke, fix it,” and that seems to be the case with cybersecurity…
Read more

Decade Retrospective: Cybersecurity From 2010 To 2019

Decade Retrospective: Cybersecurity From 2010 To 2019

The Decade Cyber Went Mainstream Yes, technically, decades begin in years that end in one, but it’s easier to say the 2010s than the 2011s. Prior to 2010, cybersecurity was an insular domain. No one really cared, until something they were using didn’t work. Devices blew up due to malware or adware, and users got…
Read more

How To Recognize False Claims And Avoid Cybersecurity 'Snake Oil'

How To Recognize False Claims And Avoid Cybersecurity ‘Snake Oil’

Cybersecurity – Have you ever been awake at 3 a.m. and looking for something to watch on TV? If so, it’s likely you’ve gone down the rabbit hole of infomercials. Vendors make bold claims about products that can do anything and everything. However, many of these claims are sensationalized or, in some cases, completely fabricated…
Read more

How DevOps and security teams can get along better

How DevOps and security teams can get along better

Are we stuck in a rut? DevOps – Agile software development has been with us for nearly two decades since the original Manifesto was published. Software development and IT teams all strive for better software that responds to customer needs, broadly in line with the principles of agile. However, there are still problems that exist…
Read more

IoT Device Security Concerns Could Limit IoT Growth

IoT Device Security Concerns Could Limit IoT Growth

Would you deploy an IoT device if you knew it could be hacked? Surprisingly, the answer is usually “yes.” Even though security exploits are frequently reported, billions of devices are deployed every year because, in most cases, the tangible benefits of IoT solutions outweigh any perceived risks. However, a big increase in device breaches would…
Read more

Making The Smart Bet On Cybersecurity

Making The Smart Bet On Cybersecurity

There is no denying that cybersecurity should form a key part of any business strategy, so why do high-profile data breaches keep occurring? A lot has been written about how such attacks are becoming the norm, but reconciling the risks of an attack with an appropriate business strategy remains a significant challenge. While larger enterprises…
Read more