employee snoop

Half of ex-employees still have access to corporate applications

Businesses aren't doing enough to guard against the security risks presented by ex-employees, according to new research from identity management firm OneLogin.

The study finds that nearly half (48 percent) of respondents are aware of former employees who still have access to corporate applications, with 50 percent of IT decision-makers ex-employee's accounts remaining active once they have left the company for longer than a day.

By Ian Barker -
Security

How prepared are businesses for cyber security threats?

Businesses are still failing to ensure they are protecting themselves effectively online, despite the growing number of damaging security threats, a new report from BT has claimed.

The UK phone giant has teamed up with KPMG for a new guide advising businesses as to how they can stay safe online when facing the number of complex challenges involved in running a business during this rapidly-changing time.

By Michael Moore -
JFK Airport

US border officials can't search your cloud data

According to the United States Department of Homeland Security, border officials are permitted to search the devices of anyone entering the country with or without probable cause, though there is a limit to type of content they can view.

Senator Ron Wyden sent a letter to Homeland Security in February seeking clarification regarding why US Customs and Border Protection (CBP) has been conducting more searches than ever before.

By Anthony Spadafora -
IBM logo

IBM announces breakthrough in encryption and data protection for enterprises

With data breaches a problem that shows no signs of going away, businesses are increasingly seeking to protect their information with encryption.

But with large volumes of information this can be time consuming and costly. To address the problem, IBM is announcing a breakthrough encryption engine that, for the first time, makes it possible to encrypt all data associated with any application, cloud service or database all the time.

By Ian Barker -
Cisco

Cisco buys network security company Observable Networks

In an effort to bolster its offerings in the enterprise security space, Cisco has announced that it has acquired the company Observable Networks which provides real-time network behavior monitoring.

The terms of the deal have not yet been made public though Observable Networks value was estimated at around $16 million during its last round of funding in May of 2016.

By Anthony Spadafora -
Network security

Industrial control security practitioners 'working blind' to protect their network

Four out of 10 industrial control security practitioners don’t have proper visibility into their ICS networks. This is according to a new study by the SANS Institute.

Based on a poll of ICS practitioners and cybersecurity stakeholders across various verticals, including energy, manufacturing, oil and gas, the report says that 40 percent of defenders are actually working blind to detect a cyber attack.

By Sead Fadilpašić -
US map flag

The US states with the highest malware infection rates

Computer users in New Hampshire are three times more likely than those elsewhere in the US to get a malware infection on their computers according to a new report.

The study from Enigma Software Group (ESG), the company behind SpyHunter, analyzed over 1.5 million infections detected by SpyHunter across all 50 states in the first six months of this year.

By Ian Barker -
endpoint protection

Kaspersky brings protection to business Macs

There has long been a perception that Macs are somehow immune to cyber attacks, but as the security landscape has changed they've become an attractive target for hackers looking to gain access to corporate networks.

Kaspersky Lab is launching a new edition of its Kaspersky Endpoint Security Cloud to give corporate Macs cloud-based multilayered protection. Aimed at small and medium businesses and managed service providers, it also brings more automation and management capabilities.

By Ian Barker -
password-protection

Dealing with password overload

In the United States, the average email address is associated with no fewer than 130 different accounts on the Internet. How many accounts do you use on a daily basis? Chances are there are accounts out there you haven’t seen or thought about in decades. Many people report having more password protected accounts than they can recall, and while you might not be using all of the accounts currently they may be giving hackers access to those accounts you do use regularly because of one common habit: password reuse.

Millennials, though they are digital natives and have grown up being told the proper password safety procedures, are shockingly the most likely group to reuse passwords. Instead of leading by example as the technologically advanced digital natives they are, millennials are making things less secure for everyone.

By Brian Wallace -
Intelligent APIs

New solution prevents bots from accessing API servers

Bots are often the culprits behind web scraping, brute force attacks, online fraud, account hijacking, data theft, and more. Often these attacks are made through the API servers that power public-facing websites and mobile applications.

A new solution from bot detection specialist Distil Networks is aimed at protecting these servers by determining whether a human is using a verified browser or mobile device to gain access.

By Ian Barker -
blindfold

A third of security professionals are unprepared for dealing with cyber threats

One in three security professionals lack effective intelligence to detect and action cyber threats, according to a new survey from threat intelligence platform Anomali.

In addition 24 percent believe they are at least one year behind the average threat actor, with half of this sample admitting they are trailing by two to five years.

By Ian Barker -
identity login

Consumers want online retailers to provide two-factor authentication

In today’s fast-paced world, one might think consumers value speed more than anything. In case of online banking, however, this is not the case. Instead, consumers would rather have more security than speed.

This is according to a new report by MYPINPAD, the company that enables multi-factor authentication for touchscreen devices.

By Sead Fadilpašić -
hacked-laptop

Many businesses believe they can be hacked

Businesses aren’t investing enough to protect their businesses from data breaches. What’s more, even the funds they are investing are going down the wrong path.

New research from digital security firm Gemalto found that, despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT Professionals still believe perimeter security is effective at keeping unauthorized users out of their networks.

By Sead Fadilpašić -
Online Shopping Cart

Shopping cart attack provides insight into criminal operations

The Magecart attack which injects JavaScript into unpatched eCommerce sites in order to capture payment information first appeared in October last year.

Researchers at threat management specialist RiskIQ have been following a new strain of Magecart and found that it offers a rare insight into the operations of the actors behind digital threats.

By Ian Barker -
Attack button

SMBs lack clear plans on cyber-attack aftermaths

There’s plenty of talk on how small and medium-sized businesses can and should protect themselves from cyber-attacks. However, when it comes to the aftermath of a cyber-attack, things are awkwardly quiet.

This is according to a new report by PolicyBee, which says cyber recovery is not really in the minds of SMB owners. This is despite a third of those surveyed saying that they think a cyber-attack is inevitable, with a further quarter believing it is "likely" to happen.

By Sead Fadilpašić -
Load More Articles