Safeguard Email From Internal and External Threats

Email continues to be a major source of cyber-attacks, and security and risk officers need to be more aware of both outside attackers and internal threats, says a recent study. The report, “Don’t Just Look Externally for Security Threats,” points to three groups responsible for these threats: external attacks that have compromised internal accounts. Read/see […]

Why Data Storage Issues Keep CIOs Up at Night

With storage capabilities struggling to keep up with the growth of data, the majority of CIOs and other organizational leaders are reassessing their data storage approaches and strategies, according to a recent survey from SUSE. The resulting report, “Numbers Tell Stories,” indicates that most IT decision-makers are concerned that data growth may cause storage issues […]

7 Ways Hackers Target Your Employees

Cybercriminals are testing the strength of your organization’s defensive wall, looking for the one crack they need to launch their attacks. Oftentimes that flaw isn’t a “what,” but a “who.” Read/see the slide show explaining the seven ways in which hackers target your employees on Dark Reading.

Mature Access Management Curtails Breaches

Enterprise security is failing, and one culprit is immature identity and access management (IAM), according to a new study, “Stop the Breach: Reduce the Likelihood of an Attack Through an IAM Maturity Model,” which was conducted for Centrify by Forrester Consulting. In 2016, the report states, hackers compromised more than 1 billion identities. Read/see the […]

11 Cyber-Security Predictions for 2017

A new forecast predicts that automated malware attacks will have a devastating effect on the internet of things (IoT). It also predicts the rise of the Shadownet (IoT botnets that can’t be seen or measured using conventional tools), cloud poisoning, more growth of Ransomware as a Service, and attacks on smart buildings Read/see the slide […]

How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Read/see the slideshow explaining […]

How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Read/see the sideshow explaining […]

The 6 Riskiest Social Media Habits to Avoid at Work

Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk. Read/see the slideshow explaining the six riskiest social media habits that employees should avoid at work on Dark Reading.

Dealing With Email Security Threats

Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches. However, despite perceptions that these attacks mostly originate from the outside, many breaches are connected to internal glitches, breakdowns and problems, according to a February 2017 report from email security vendor Mimecast […]

7 tips to strengthen online security

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily […]