How large would the financial losses get in case of a global cyber attack?

How Much Calculator Price Cost Pen Paper

A global cyber-attack could be as expensive as a major natural disaster, a new report has claimed.

Analysis by Lloyd’s of London compared the effects of a hypothetical global cyber-attack to the super storm known as Hurricane Sandy that hit the US coast in 2012, in terms of the financial impact.

Continue reading

iOS and its effect on enterprise security

businessman thumbs down angry suit cell phone iPhone

Over the past decade, iOS devices have found their way into many businesses. According to a new report this has led to an increase in the number of attacks and incidences of malware on the platform.

Mobile threat defense company Skycure analyzed the security impact of iOS on the enterprise over the past ten years and found that the percentage of enterprise iOS devices that have malicious apps installed today has more than tripled since the third quarter of 2016. In comparison, the rate of Android malware infections has stayed relatively flat.

Continue reading

Symantec and Bay Dynamics partner to fight insider threats

insider threat

Insider threats are a major problem for all types of organization and more than ever firms are looking for data loss prevention strategies.

Cyber security specialist Symantec is integrating Bay Dynamics' Risk Fabric analytics platform with its data loss prevention and other technologies, to create a central point of behavioral analytics that dynamically delivers mitigation actions to keep malicious insiders from stealing sensitive data.

Continue reading

Half of ex-employees still have access to corporate applications

employee snoop

Businesses aren't doing enough to guard against the security risks presented by ex-employees, according to new research from identity management firm OneLogin.

The study finds that nearly half (48 percent) of respondents are aware of former employees who still have access to corporate applications, with 50 percent of IT decision-makers ex-employee's accounts remaining active once they have left the company for longer than a day.

Continue reading

How prepared are businesses for cyber security threats?

Security

Businesses are still failing to ensure they are protecting themselves effectively online, despite the growing number of damaging security threats, a new report from BT has claimed.

The UK phone giant has teamed up with KPMG for a new guide advising businesses as to how they can stay safe online when facing the number of complex challenges involved in running a business during this rapidly-changing time.

Continue reading

US border officials can't search your cloud data

JFK Airport

According to the United States Department of Homeland Security, border officials are permitted to search the devices of anyone entering the country with or without probable cause, though there is a limit to type of content they can view.

Senator Ron Wyden sent a letter to Homeland Security in February seeking clarification regarding why US Customs and Border Protection (CBP) has been conducting more searches than ever before.

Continue reading

IBM announces breakthrough in encryption and data protection for enterprises

IBM logo

With data breaches a problem that shows no signs of going away, businesses are increasingly seeking to protect their information with encryption.

But with large volumes of information this can be time consuming and costly. To address the problem, IBM is announcing a breakthrough encryption engine that, for the first time, makes it possible to encrypt all data associated with any application, cloud service or database all the time.

Continue reading

Cisco buys network security company Observable Networks

Cisco

In an effort to bolster its offerings in the enterprise security space, Cisco has announced that it has acquired the company Observable Networks which provides real-time network behavior monitoring.

The terms of the deal have not yet been made public though Observable Networks value was estimated at around $16 million during its last round of funding in May of 2016.

Continue reading

Industrial control security practitioners 'working blind' to protect their network

Network security

Four out of 10 industrial control security practitioners don’t have proper visibility into their ICS networks. This is according to a new study by the SANS Institute.

Based on a poll of ICS practitioners and cybersecurity stakeholders across various verticals, including energy, manufacturing, oil and gas, the report says that 40 percent of defenders are actually working blind to detect a cyber attack.

Continue reading

The US states with the highest malware infection rates

US map flag

Computer users in New Hampshire are three times more likely than those elsewhere in the US to get a malware infection on their computers according to a new report.

The study from Enigma Software Group (ESG), the company behind SpyHunter, analyzed over 1.5 million infections detected by SpyHunter across all 50 states in the first six months of this year.

Continue reading

Kaspersky brings protection to business Macs

endpoint protection

There has long been a perception that Macs are somehow immune to cyber attacks, but as the security landscape has changed they've become an attractive target for hackers looking to gain access to corporate networks.

Kaspersky Lab is launching a new edition of its Kaspersky Endpoint Security Cloud to give corporate Macs cloud-based multilayered protection. Aimed at small and medium businesses and managed service providers, it also brings more automation and management capabilities.

Continue reading

Dealing with password overload

password-protection

In the United States, the average email address is associated with no fewer than 130 different accounts on the Internet. How many accounts do you use on a daily basis? Chances are there are accounts out there you haven’t seen or thought about in decades. Many people report having more password protected accounts than they can recall, and while you might not be using all of the accounts currently they may be giving hackers access to those accounts you do use regularly because of one common habit: password reuse.

Millennials, though they are digital natives and have grown up being told the proper password safety procedures, are shockingly the most likely group to reuse passwords. Instead of leading by example as the technologically advanced digital natives they are, millennials are making things less secure for everyone.

Continue reading

New solution prevents bots from accessing API servers

Intelligent APIs

Bots are often the culprits behind web scraping, brute force attacks, online fraud, account hijacking, data theft, and more. Often these attacks are made through the API servers that power public-facing websites and mobile applications.

A new solution from bot detection specialist Distil Networks is aimed at protecting these servers by determining whether a human is using a verified browser or mobile device to gain access.

Continue reading

A third of security professionals are unprepared for dealing with cyber threats

blindfold

One in three security professionals lack effective intelligence to detect and action cyber threats, according to a new survey from threat intelligence platform Anomali.

In addition 24 percent believe they are at least one year behind the average threat actor, with half of this sample admitting they are trailing by two to five years.

Continue reading

Consumers want online retailers to provide two-factor authentication

identity login

In today’s fast-paced world, one might think consumers value speed more than anything. In case of online banking, however, this is not the case. Instead, consumers would rather have more security than speed.

This is according to a new report by MYPINPAD, the company that enables multi-factor authentication for touchscreen devices.

Continue reading

Load More Articles