5 Tips For Securing Your Network Printing

Your office printer might not appear to pose much of a security threat. But if left unprotected, it may in fact present a serious risk to your network and resources. For example, with access to a networked printer, an unauthorised user can discover device configurations, network information and user credentials. This is because printers are […]

9 Steps to More-Effective Organizational Security

Having a robust and well-defined organizational security framework — one that focuses on both information technology and security — is crucial for fulfilling business requirements. Too often security can be viewed as a barrier, but ultimately, it’s the only way to help protect the enterprise from threats and avoid a data compromise. Tim Bandos, Senior Director […]

Your website is under constant attack

There’s this popular fallacy that attackers on the internet always target particular sites. They don’t. Yes, some do, but most attacks are made by bots, which don’t know a thing about you, your business, or your website. Bots don’t care who you are or what you do. If you’re on the web, you’re a target. […]

Insider Threat Programs: A Beginner’s Guide

What your company spent years to develop can be lost in an instant at the hands of one bad intentioned employee. The statistics on employee theft of intellectual property (IP) paint a dark portrait of what employees do when disgruntled, moving on, or stockpiling for a rainy day. William Evanina, the U.S. government’s National Counterintelligence […]

Escape future ransomware attacks by leveraging the right technology

Last year, multiple industry verticals saw the extreme effects of ransomware, with WannaCry and Petya leading the pack in terms of damage. To make matters worse, according to a report by Kaspersky, the number of ransomware threats is expected to increase in 2018. The evolution of ransomware, resulting in more diverse and innovative attacks, is going to heavily hit enterprises […]

Thousands of Internet of Things devices at risk!

If you are using any smart device made by Comcast, Oracle, D-Link, ZTE, HP, Siemens, Canon, and many others, you are at risk. This dire vulnerability affects a web server called GoAhead that’s been embedded in hundreds of thousands of IoT devices. Any smart device including your washing machine or smart TV which connects to this […]

Meltdown-Spectre: Intel says newer chips also hit by unwanted reboots after patch

Intel confirmed in an update late Wednesday that not only are its older Broadwell and Haswell chips tripping up on the firmware patches, but newer CPUs through to the latest Kaby Lake chips are too. The firmware updates do protect Intel chips against potential Spectre attacks, but machines with Ivy Bridge, Sandy Bridge, Skylake, and Kaby […]

Applying Defense-in-Depth to the Digital Battlefield

Defense-in-depth is a concept born on the battlefield, in a time where the greatest threat to an organization’s security was physical, not digital. The challenge with defending the front lines of attack in the modern age is that on today’s virtual battlefield, the enemy is constantly advancing. Malware itself is now sold as-a-service on the […]

What is the impact and likelihood of global risks?

The World Economic Forum, a not-for-profit foundation that each year gathers participants from around the world to discuss a wide range of global issues, has published its yearly Global Risks Report. Based on the opinions of almost 1,000 global experts and decision-makers, the top 5 global risks in 2018 in terms of likelihood are extreme weather […]

How do you secure the cloud? New data points a way

The march toward the cloud for data and services has many companies rethinking their approach to cyber security. Do they need a cloud security strategy? What is different about a cloud security strategy? Two recent surveys have shed light on how security strategies are changing, and more important, how they should change. Placing more IT […]