The elements of cybersecurity hygiene and secure networks - Part 3


While it’s essential that employees consistently avoid taking risks that could lead to a data breach, even top-performing employees don’t necessarily have top-notch cybersecurity knowledge. Thus, organizations are in charge of bridging the cybersecurity skill gap to keep employees from damaging the company’s network by accidentally uploading of a malicious program or sharing confidential documents with the wrong people.
Though it’s easy for IT and leadership teams to put systems in place that defend their network from external threats, well-intentioned internal users can be a hackers easy way in. The only way for organizations to counter this is with education and training.
Symantec boosts its endpoint security offering


Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments to exploit gaps and discover new paths to lucrative targets.
Symantec is announcing enhancements to its endpoint security portfolio designed to defend against the most sophisticated cyberattacks as well as improving application discovery and risk assessment.
Rush to digital transformation puts security of data at risk


Digital transformation projects are underway in the vast majority of businesses, according to a new report, but 'aggressive' transformers are most at risk from data breaches.
The latest Data Threat Report from Thales eSecurity shows digital transformation in some form is happening in 97 percent of organizations. 86 percent say they feel vulnerable to threats, yet less than a third of respondents (only 30 percent) are using encryption within these environments.
How to disable FaceTime and protect your privacy


By now you have probably heard about the bug that's been discovered in Apple's FaceTime. In short it is an exploit that lets you connect a call you have placed rather than waiting for the recipient to pick up -- so you can then listen to audio and watch video.
Apple is working on a fix, and it you want to be sure that you don't fall victim to eavesdropping, you should think about disabling FaceTime on your iOS device. Here's how to do just that.
Massive FaceTime privacy bug lets people eavesdrop on audio and video calls before they've been answered -- and Apple doesn't have a fix yet


Apple is scrambling to fix a serious bug that has been discovered in its FaceTime messaging services. The bug makes it possible to spy on the people being called, even if the call is not picked up.
This is a serious privacy issue, as it gives someone the ability to secretly eavesdrop on someone -- or even watch them -- without their knowledge. At the moment, Apple does not have a fix but the company says it is working on the problem and will address it by the end of the week. In the meantime, you may want to consider disabling FaceTime on your iOS device.
69 percent of employees share passwords with colleagues


According to a new study, 69 percent of respondents admit to sharing passwords with others in the workplace, and 51 percent reuse an average of five passwords across their business and personal accounts.
The study by authentication key vendor Yubico and Ponemon, released to coincide with Data Protection Day, also finds two-factor authentication isn't widely used, 55 percent don't use it at work and 67 percent don't use it for their personal accounts.
Leak shows that Android Q will bring native face unlock to more phones


A new Android Q leak suggests that Google is ready to copy another of the features iOS users have come to know and love: facial unlock.
There are already a number of Android handsets -- including recent phones from OnePlus -- which have their own implementation of the biometric security feature, but with Android Q, it is looking as though the feature will be hard-baked into the operating system.
Automated attacks target cloud infrastructure


Enterprises continue to grow their cloud usage, but this inevitably presents challenges when it comes to keeping systems secure.
New research from Securonix Threat Research highlights an increase in automated attacks targeting cloud infrastructures.
Feel overlooked and underappreciated? You must work in IT security


Most IT security professionals in the UK feel they’re suffering from an image problem among fellow workers, according to new research commissioned by privileged access management specialist Thycotic.
Almost two thirds of respondents (63 percent) feel that their security teams are either viewed as the company naysayers -- specifically either 'doom mongers' or a 'necessary evil' (36 percent).
New solution protects enterprises against ransomware


Ransomware attacks are increasingly well targeted and complex, and they can prove devastating for businesses.
Storage specialist Cohesity is launching a new set of anti-ransomware capabilities for its DataPlatform that can directly combat attacks.
New Android app allows simple two-factor authentication across all apps and accounts


We're all being encouraged to use two-factor authentication to make our online accounts more secure.
But 2FA can be a major pain when you update to a new device and have to re-authenticate everything. Even when users save their private 2FA keys to migrate onto new devices, it can still take time to manually reset 2FA for each account.
Consumer threats down as cybercriminals target business


Consumer threats declined by three percent in 2018 as cybercriminals learned that businesses can deliver a much bigger payout.
The latest State of Malware report from Malwarebytes shows consumer threats decreased steadily across the board including a 30 percent drop in adware, an 84 percent decrease in hijacker tools, a 28 percent decrease in worm activity and a 29 percent drop in ransomware.
The most-clicked phishing lines of 2018


Security awareness training company KnowBe4 has put together its latest list of the most-clicked phishing subject lines.
Popular categories for phishing messages include, deliveries, passwords, company policies, vacations and IT department. Other popular keywords are, Amazon, Wells Fargo and Microsoft.
Businesses can safely delay patching most vulnerabilities


Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be 'smarter' in their patching regimes and prioritize the issues that present most risk.
The study from Kenna Security suggests companies are increasingly recognizing that the majority of vulnerabilities are never weaponized or exploited in a cyberattack.
Cryptominers dominate 2018's malware landscape


The four most prevalent malware types in 2018 were cryptominers and they impacted 37 percent of organizations globally.
The latest security report from Check Point shows that despite a fall in the value of all cryptocurrencies, 20 percent of companies continue to be hit by cryptomining attacks every week. At the same time ransomware attacks have fallen sharply, impacting just four percent of organizations globally.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.