Data is a vital resource in the education sector and increasingly schools and colleges store information in digital form. Digital technology is also moving into the classroom, but of course all this comes with greater risk.
Yet according to new research from security rating service SecurityScorecard, across 17 industries in the US education comes second to last in terms of total cybersecurity.
Email and data security company Mimecast has released the results of its latest Email Security Risk Assessment (ESRA) which finds that mail security systems inaccurately deemed nearly 17,000 dangerous files 'safe' this quarter.
That represents a 25 percent increase over the previous quarter. Dangerous file types like jsp, .exe, .dll and .src are rarely emailed for legitimate purposes and can be used launch a cyberattack.
A new study reveals that 60 percent of organizations globally have suffered two or more business-disrupting cyber events -- defined as cyberattacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment -- in the last 24 months.
It used to be easy to spot a phishing email, you just looked out for bad grammar and URLs that clearly didn't correspond to the organization being impersonated.
Recently though they've become harder to detect. According to the latest Global Threat Report from Comodo Cybersecurity, phishing really is getting better and it now represents one in every 100 emails received by enterprises.
Earlier this year we looked at Duo Security's research into Twitter bots which focused on fake followers. The company has now published some further research looking at amplification bots.
So what is an amplification bot? They exist to boost content through likes and retweets. Duo has produced an algorithm to identify these bots and was able to find more than 7,000 over a 24 hour period.
As businesses embrace digital transformation, things like the growth of distributed workforces and remote work are impacting both the day-to-day responsibilities and long-term plans of IT managers.
Software and cloud managed services company Unify Square has commissioned a survey from Osterman Research to sample the views of IT managers who oversee unified communications (UC) and workstream collaboration (WSC) environments.
Many people will be receiving new tech gadgets over the Christmas period, including smartphones, gaming consoles, tablets, connected toys, and a whole range of apps to go with them.
But new research from from cybersecurity training organization the SANS Institute finds that while people are aware of the risks these devices can pose, they may not have the skills to properly protect them.
We all know that Windows 10 logs data about what you do on your PC. What you may not be aware of is that it still sends that information to Microsoft even if you have told it not to. Sneaky, huh?
People on Reddit have been discussing the issue and finding that even if the option to send data to the cloud is turned off it still shows in the online Privacy Dashboard.
DevOps teams are under constant pressure to release faster, improve quality and keep costs under control. This means testing increasingly becomes a priority to ensure accelerated releases and many companies are turning to cloud-based testing tools.
However, as with any move to the cloud, there are some challenges that need to be overcome. We spoke to Uzi Eilon, chief technology officer at cloud-based testing platform Perfecto to find out more.
Businesses are starting to recognize that it may be impossible to keep attackers completely out of their networks, so they are starting to look for ways of fighting them more efficiently.
One of the ways of doing this is to use decoys to lure attackers and allow the threat to be dealt with before it affects live systems. We spoke to Carolyn Crandall, chief deception officer at Attivo Networks to find out more about how this deception technology works and what it can do.
According to a new report, 96 percent of all employees face some sort of difficulty when looking for the most recent version of a document or file.
The study from information management company M-Files also reveals that 83 percent of staff worldwide are forced to recreate documents that already exist but can't be found.
For many people wearing a watch is as much about how it looks as how it works. In these days of smart devices that often requires a trade off between style and function.
Do you leave your good-looking watch at home while you wear your smart watch, or do you look a bit needy by putting a wearable fitness tracker or similar on your other wrist? With the Oaxis Timepiece you no longer have to make the choice.
New research released by security awareness and email protection company Mimecast finds that more than two-thirds of employees admit to personal use of work devices during office hours.
Mimecast surveyed more than 1,000 people who use company-issued devices (such as mobile phones, desktop computers or laptops) in the workplace, in order to understand their behavior, but also their awareness of basic threats plaguing organizations.