credential hacker

Windows Safe Mode attack could put your passwords at risk

Because it allows only the essential elements of the Windows operating system to run, Safe Mode is a useful tool for diagnosing and fixing problems. But according to researchers at CyberArk Labs it could also be exposing you to risk.

Safe Mode stops a lot of third-party software from running at startup and that can include many security solutions. Attackers who have gained remote access to a machine may therefore be able to reboot it into Safe Mode to launch attacks.

By Ian Barker -
lock key smartphone iPhone

IBM Cloud adds mobile security service

When it comes to corporate IT security, one of the biggest pain points is the mobile device. With almost every employee having one, and many bringing their own, the cyber-attack surface increases dramatically, putting corporate data at huge amounts of risk. Now, IBM is stepping into the game with a service of its own, which aims to protects mobile devices, via IBM Cloud.

The mobile-security-as-a-service, called IBM MaaS360, aims to help IBM’s clients address local data protection standards. It is currently in operation in the US, Germany and Singapore, with France and India already in the works. They will be followed by an "additional eight countries" planned for the next two years. IBM didn’t go into further detail, but we’re hoping the UK will be among them.

By Sead Fadilpašić -
hacker

One in 50 employees could be a malicious insider

If your company counts 50 people, at least one of them might be a malicious insider, according to new studies. Imperva has released a report which says that 36 percent of surveyed companies suffered a security incident involving malicious insiders in the past year. One in every 50 employees is considered to be a malicious insider.

Another interesting finding is that not all malicious insiders are disgruntled former employees looking to inflict some damage as they close the door on their way out. There are people who are using their position to transform confidential data into a second stream of income. The ramifications of such behavior can be dire -- in one example, a company has had to shut down operations for three weeks, after an attack, and another had its banking system hacked.

By Sead Fadilpašić -
Cyber attack

Cost of a cyber-attack will soon reach $1 million for large businesses

We are coming closer to the point where a cyber-attack will cost every large business more than $1 million. According to a new Kaspersky Lab report, a single cyber-security incident now costs a large business, on average, $861,000.

Small and medium-sized enterprises (SME) pay ten times less, on average -- $86,500. The new report also stresses, once again, how costs go up the longer the threat remains unseen. For an SME, it will have to pay 44 percent more to recover from a week-old attack, compared to the one spotted on the first day. Among large companies, the percentage sits at 27.

By Sead Fadilpašić -
students laptop

Students need better data security education

As students head back to university, a survey by Intel Security reveals that, in the UK at least, half of them are failing to protect their phones, tablets and laptops from online threats.

The survey of more than 1,000 UK-based students carried out in conjunction with The National Student finds that despite a quarter of teenagers reporting that they are 'almost constantly' online, only 50 percent of students ensure they have the necessary security software installed to keep their devices and data safe.

By Ian Barker -
Priorities

Security, disaster recovery are top IT priorities for UK businesses

UK businesses’ number one technology priority is security, according to a new survey by EACS. The IT solutions and managed services provider polled CIOs, IT directors and IT managers, and released the results in a whitepaper entitled Business & Technology Priorities 2016 survey.

Among the top priorities for them are better efficiency, operating results, increased productivity and cutting costs. The study also found one interesting thing -- all IT decision makers agree that no company can be 100 percent safe. That is why disaster recovery is in second place on the list of tech priorities.

By Sead Fadilpašić -
insider threat

How cyber security professionals see insider threats

Whilst the popular view of hackers tends to be of outsiders, there's been increasing emphasis in recent years on the threat to enterprise data posed by those inside the organization.

Behavior analytics company RedOwl carried out a survey at last month's Black Hat conference, asking almost 300 security professionals for their views on insider threats, and the results are released today.

By Ian Barker -
Login screen

Ping Identity partners with Microsoft to deliver secure application access

Many large enterprises use Azure Active Directory (Azure AD) as their identity platform for managing users and providing secure access to thousands of cloud SaaS and on-premises applications.

Secure access company Ping Identity is announcing a collaboration with Microsoft to deliver integrations that will expand secure remote access and single sign-on (SSO) from any device to more on-premises web applications for Microsoft Azure AD customers.

By Ian Barker -
Union flag keyboard

GCHQ plans Great British Firewall to protect web users

The UK's cyber intelligence agency GCHQ is planning what has been labelled a 'Great British Firewall' to protect individuals and companies against cyber attacks.

The idea emerged in a speech delivered by the head of GCHQ's national cybersecurity centre, Ciaran Martin, at the Billington Cyber Security Summit in Washington DC.

By Ian Barker -
credit card phishing

American Express customers phished using phishing prevention scam

In a rather ironic twist on traditional phishing attacks, customers of American Express are being targeted by a campaign promising them an identity theft and phishing prevention tool.

The phishing emails offer SafeKey use as bait. This is a legitimate program that Amex offers its customers as an additional layer of security to guard against ID theft and phishing.

By Ian Barker -
Software testing

One in five companies fail to test for security vulnerabilities

Many businesses don't carry out frequent security testing despite believing that it's critically important to securing their systems and data, according to a new survey.

The study from managed security services company Trustwave and Osterman Research finds that one in five businesses surveyed don't do any security testing, despite the fact that 95 percent of respondents reported encountering common security issues associated with security vulnerabilities.

By Ian Barker -
Threat

New partnership aims to improve threat detection

The problem with many security solutions is that the number of alerts they generate leads to a good deal of time in investigations, some of which will turn out to be false positives.

Real-time analytics company Corvil is partnering with endpoint security specialist Carbon Black to offer customers unified cyber threat detection, analysis, and response.

By Ian Barker -
seagate2015_2c_horizontal_pos

Employees sue Seagate over HR department's private data leak

After falling victim to a phishing scam in March, Seagate is now being sued by its own employees whose sensitive data was exposed in the leak.

The company's HR department was tricked into providing the operators of the phishing scheme with the personally identifiable information (PII) of 10,000 past and current employees and W-2 forms that include their Social Security numbers along with their wage, salary and tax information.

By Anthony Spadafora -
Office printer woman

Dispelling 5 common myths about desktop printers in the office

They may seem like technology from the days of old, but make no mistake -- desktop printers still can hold an important place in British businesses today. Not only do they help create efficient and flexible printing management, but they also can help keep British office workers at their most productive, rendering them potentially one of the most important products for IT managers in 2016.

The value of desktop printers is often overlooked due to advancements of new printer technology services, including an array of enterprise-orientated features, however, the traditional role of the printer mustn’t be forgotten. Desktop printers intertwined within a multi-device print and document management strategy, whilst also combining bigger multi-function devices with smaller devices, should arguably become commonplace for all managers responsible for their company’s printing activities.

By Steven Hastings -
why question mark

The growing security risks in enterprise Windows environments [Q&A]

ManageEngine recently announced the results of its global Active Directory and Windows Server Security -- Trends and Practices Survey for 2016, which found that 70 percent of IT administrators across the globe agree that their Windows environments are not immune to malicious attacks.

To delve a bit deeper, we spoke to Derek Melber, a technical evangelist for ManageEngine.

By Sam Pudwell -
Load More Articles