Articles about Security

Pick up Acronis Cyber Protect Home Office 2023 Advanced and 250 GB of cloud data for just $29.99

Everyone needs a backup -- but those backups require protecting too. Thankfully Acronis Cyber Protect Home Office 2023 Advanced has both bases covered: comprehensive backup for everything from individual files and folders to entire hard drives on the one hand, and protection against data-stealing malware on the other.

Not only does Acronis Cyber Protect Home Office 2023 Advanced -- available for under £25/$30 thanks to our great deal -- allow you to back up your files to another drive plugged directly into your PC or Mac or some form of network attached storage, but your subscription also entitles you to hundreds of gigabytes of online storage space, ensuring at least one copy of your data is stored offsite according to backup best-practice.

Continue reading

New Radiant Logic solution improves identity decision making

Enterprises need real-time access to lots of data, but it's important that access to that data is properly controlled.

Radiant Logic is launching a new data intelligence offering that offers identity observability and visualization capabilities, all built on an extensible API-layer and available as a SaaS offering.

Continue reading

Microsoft releases emergency patches for Intel CPU vulnerabilities in Windows 10, Windows 11 and Windows Server

Intel logo

Following a security disclosure by Intel way back in June of last year about vulnerabilities affecting its processors, Microsoft has issued a series of out-of-band fixes for the flaws.

In all, Intel revealed details of four data-exposing chip flaws (CVE-2022-21123, CVE-2022-21125, CVE-2022-21127 and CVE-2022-21166) described collectively as Processor MMIO (memory-mapped I/O) Stale Data Vulnerabilities. Now Microsoft has released a total of six emergency updates for various versions of Windows 10, Windows 11 and Windows Server.

Continue reading

Asset management and security -- how to secure your whole tech stack

Red and blue security padlock

In a tumultuous geopolitical environment, organizations use digital transformation initiatives to accelerate and maintain their productivity. Companies want IT to increase innovation and improve the efficiency of processes across their business. At the same time, IT leaders are under mounting pressure to gain full visibility of their infrastructure. This pressure stems from the need to minimize or mitigate the risk of any disruption that could directly impact customers, shareholders and employee data.

Without a clear understanding of where your tech stack sits today, those future goals will forever be out of reach. Whether you are a brand new CIO taking on IT responsibility for the first time, or a seasoned CIO with years of experience, being able to go between the big picture and the nuanced details is a necessary skill to develop.

Continue reading

Over 30 percent of mobile users encounter phishing attacks

mobile phishing

According to data from Lookout, 2022 has seen the highest percentage of mobile phishing encounter rates ever, with an average of more than 30 percent of personal and enterprise users exposed to these attacks every quarter.

Since 2021, mobile phishing encounter rates have increased by around 10 percent for enterprise devices and more than 20 percent for personal devices.

Continue reading

Known vulnerabilities pose the biggest threat

Known vulnerabilities for which patches have already been made available are the primary vehicle for cyberattacks, according to a report released today by Tenable.

The Tenable Research team analyzed cybersecurity events, vulnerabilities and trends throughout 2022, including 1,335 data breach incidents publicly disclosed between November 2021 and October 2022.

Continue reading

88 percent of organizations have suffered cyber breaches in the last two years

Data breach

A new survey of 300 CIOs, CISOs, and security executives from enterprises across Europe and the USA shows that 88 percent of organizations admit to being compromised by a cyber incident over the past two years.

The study from Pentera reveals that this is despite organizations having an average of almost 44 security solutions in place.

Continue reading

GDPR, liability and email security management in the digital age

On the 25th of May, 2018, the General Data Protection Regulation (GDPR) was passed, bringing into law a number of privacy and data protection regulations for those within the EU. Any business that operated within the EU had to immediately begin to respect the regulations laid out by this law.

Yet, even businesses outside of the EU are impacted, due to the fact that anyone that does business with someone within the EU area still must fall under these regulations. This meant that the vast majority of international companies, stretching from Asia and South America to North America and beyond, all had to start abiding by these laws.

Continue reading

Data protection in the cloud: 3 best practices

Cloud data protection

The "Global DataSphere" is exploding in size. IDC predicts that by 2026, the amount of data in the world will have doubled again. While most enterprises have digitized their operations, they continue to add more strategic workloads and create more and more data. So, as the amount of data enterprises have to deal with grows exponentially, moving to the cloud based on an elaborated strategy offers significant benefits like scalability, flexibility and cost-effective storage.

But can this go on forever? Gartner expects total worldwide end-user spending on public cloud services will reach a record $592 billion this year, a 21 percent increase from 2022. This rapid level of growth and migration raises some concerns at an enterprise level, with fast "lift and shift" migrations meaning best-practices for modern data protection aren’t followed. The Cloud security alliance (CSA) reported that 96 percent of companies say they have insufficient security for sensitive cloud data -- so across the board we have a long way to go on this journey. Here are three best practices for enterprises to protect their data in the cloud. 

Continue reading

61 percent of Americans rely on free antivirus programs

A new report on the antivirus market from Security.org reveals that almost three-quarters of Americans still strongly believe computers need antivirus to protect their devices and 61 percent are relying on free options like Microsoft Defender.

The number relying on free solutions has held steady, down only one point since 2021. Interestingly, only eight percent of free antivirus users have experienced a breakthrough virus in the past year, compared to 10 percent of paid users.

Continue reading

Why SBOMs have become a vital element of supply chain risk management [Q&A]

In recent years, the software bill of materials (SBOM) has become a key element of software security and software supply chain risk management.

We spoke to Tim Mackey, head of software supply chain risk strategy at Synopsys to find out more about the benefits and challenges of SBOMs.

Continue reading

The NSA has some tips about how to secure your home network -- sensible, blindingly obvious and paranoid in equal measure

NSA logo

Being a government agency concerned with security, it is perhaps not particularly surprising that the NSA has some advice for locking down networks. The National Security Agency has issued a series of tips designed to help secure home networks, and while home workers and remote workers are mentioned, the tips apply to just about everyone.

While much of the advice is fairly obvious, the list of "best practices" serves as a helpful reminder about the steps that need to be taken to avoid cyber-attacks. Some advice, however, suggests a level of paranoia that is not necessarily appropriate for most people.

Continue reading

Business data at risk from oversharing

file sharing

Sharing is caring, as the saying goes, but when it comes to business data oversharing is a big problem. A new report from Concentric AI shows the number of overshared files rose 60 percent in 2022 compared to 2021.

Largely this is down to the impact of hybrid remote work, cloud migration and information sprawl across on-premises and cloud data, as well as email and messaging environments on data security.

Continue reading

WithSecure creates an 'undo button' for ransomware

Ransomware attacks continue to plague organizations and can have an effect beyond the financial, damaging reputations and customer trust.

Now though WithSecure has developed a new technology called Activity Monitor that can essentially undo the damage malware can cause.

Continue reading

Google is giving Chrome a new Password Manager -- here's how to enable it

For anyone who struggles to remember the growing list of endlessly complicated passwords needed to gain access to the plethora of online accounts we all now have, a password manager is near-essential. Chrome, like many of the web browsers, has long-featured a tool for storing and automatically entering passwords, and now Google is giving it a much-needed upgrade.

Until now, Chrome's password manager has been functional, but far from being adorned with bells and whistles. Now Google is giving it a new user interface as well as an important injection of new features.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.