32 percent of remote workers use unapproved apps and software

home working security

Remote working poses a number of risks from an IT security point of view. A new report from Lookout finds that 32 percent of remote and hybrid workers use apps or software not approved by IT and 92 percent of remote employees perform work tasks on their personal tablet or smartphone devices.

Remote workers are also less likely to follow best practices for security. 90 percent access corporate networks from areas other than their home, with an average of five different locations -- introducing security risks as company data could be exposed across multiple networks not monitored by IT. 45 percent use the same password for work and personal accounts too.

Continue reading

Why cyber insurance policies may be in jeopardy [Q&A]

insurance key

Cyber insurance has often been seen by business leaders as a monetary guarantee that even if hackers do break into their networks and steal their data, they can still escape financially unscathed.

Yet this premise was recently rocked after Lloyd's of London, the world's biggest insurance syndicate, redefined its policies to no longer cover for nation-state cyberattacks. There are other challenges facing the cyber insurance sector in the year ahead too.

Continue reading

Backups are for life, not just World Backup Day

World-Backup-Day

Backups have been an essential part of IT since the days of paper tape and punched cards, but nobody ever said they were exciting.

Of all the things that now have a day devoted to them, backups probably deserve one more than most for being the unsung savior of many an information professional's career. On today's World Backup Day we've asked some experts to tell us their views on backups and why they are still vital.

Continue reading

Beyond the smoke and mirrors of zero trust security [Q&A]

silhouette smoke ghost hand

Enterprises are faced with a barrage of new threats and entry points and as a result need to deploy, scale, enforce and maintain zero trust security policies to keep pace.

Access control needs to be at the core of any successful zero trust model but this too presents challenges. We spoke to Denny LeCompte, CEO of Portnox, to discover how organizations can overcome zero trust barriers.

Continue reading

71 percent of employees have sensitive work data on personal devices

BYOD

Allowing people to use their own devices for work comes with risks. A new report from SlashNext shows that 43 percent of employees were found to have been the target of a work-related phishing attack on their personal devices.

When it comes to securing BYOD hardware, 90 percent of security leaders say that protecting employees' personal devices is a top priority, but only 63 percent say they definitely have the tools to do so adequately.

Continue reading

Shadow data is a top concern for security teams

Young lady casting shadow of machine code

Shadow data is named as the number one concern around protecting cloud data by 68 percent of data security professionals.

A new study from Laminar reveals that the number of respondents expressing concern over shadow data has increased to 93 percent compared to 82 percent the year before.

Continue reading

Reactive approach to cybersecurity is a problem for organizations

Businessman screaming and pointing at his laptop

A new survey shows respondents feel a reactive approach to security is problematic for their organizations. 90 percent of them say they struggle with challenges when they react to cyber security problems as they arise.

The study, conducted by Forrester Consulting for WithSecure, shows most organizations currently approach cyber security on a reactive basis, with 60 percent of respondents saying they react to individual cyber security problems as they arise.

Continue reading

60 percent of organizations have had authentication breaches in the last year

Passwordless authentication - Inscription on Blue Keyboard Key.

Insecure authentication is a primary cause of cyber breaches and cumbersome login methods take an unacceptable toll on employees and business productivity, according to a new report.

The 2023 State of Passwordless Security Report, released by HYPR and Vanson Bourne, shows that 60 percent of organizations have reported authentication breaches over the last 12 months and that three out of the top four attack vectors are connected to authentication.

Continue reading

Smaller means safer as bigger businesses see more endpoint infections

Computer security

Of businesses with between 21 and 100 protected endpoints, only five percent encountered a malware infection in 2022. For smaller firms with one to 20 endpoints, the rate is 6.4 percent, but as companies grow so do infections.

For businesses between 101 and -500 endpoints the rate rises to 58.7 percent and over 500 it's 85.8 percent. These findings are from a new report by OpenText Cybersecurity which looks at the latest threats and risks to the small and medium business (SMB) and consumer segments.

Continue reading

Phishing emails soar as messages bypass standard email security solutions

phishing keyboard hook

A new report shows that 2022 saw a 569 percent increase in malicious phishing emails and a 478 percent increase in credential phishing-related threat reports published.

The report from Cofense also looks at emails bypassing SEGs and hitting users' inboxes and highlights that delivery methods for carrying out phishing campaigns continue to keep up with the advancement of technology. Cofense has witnessed a continued blending of tactics to make detection and mitigation even more difficult for organizations.

Continue reading

API attacker activity up 400 percent in six months

api

The latest State of API Security Report from Salt Security shows a 400 percent increase in unique attackers in the last six months.

In addition, around 80 percent of attacks happened over authenticated APIs. Not surprisingly, nearly half (48 percent) of respondents now say that API security has become a C-level discussion within their organization.

Continue reading

Getting the most value out of your data [Q&A]

folder stack

The past few years have seen a boom in digital transformation as enterprises have sought to modernize their operations to take advantage of a new, more flexible world of work.

But this change has often led to unwieldy data structures that are difficult to manage, which means that extracting value from the data is harder than it should be.

Continue reading

Disruptions to eCommerce cost businesses up to $1 million a month

women having problem buying on line

A new survey of retail and consumer brands shows that nearly 40 percent of all respondents suffer customer-impacting disruptions, which cost up to $1 million per month.

The survey, conducted by Forrester Consulting on behalf of Catchpoint, finds 61 percent of respondents say internet disruptions have resulted in lost revenue, while 64 percent report damage to their brand's reputation that led to lack of consumer confidence.

Continue reading

Companies struggle to protect against insider risks

insider threat

Although more than 70 percent of companies say they have an insider risk management (IRM) program in place, the same companies experienced a year-on-year increase in data loss incidents of 32 percent, according to a new report from Code42 Software.

Based on a survey of 700 cybersecurity leaders, cybersecurity managers and cybersecurity practitioners in the US, conducted by Vanson Bourne, the report shows 71 percent expect data loss from insider events to increase in the next 12 months.

Continue reading

Stolen credentials and the rise of the 'traffers'

Password

Even as we move towards passwordless authentication methods, stolen credentials remain a major problem for businesses.

A new report from cyber risk management company Outpost24 highlights the increasing professionalization of the market for stolen credentials thanks to the rise of what are known as 'traffers'.

Continue reading

Load More Articles