Month: April 2019

IndependentKrebs

Android 7.0+ Phones Can Now Double as Google Security Keys

Credit to Author: BrianKrebs| Date: Thu, 11 Apr 2019 16:14:53 +0000

Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google’s various services. The company announced that all phones running Android 7.0 and higher can now be used as Security Keys, an additional authentication layer that helps thwart phishing sites and password theft.

Read More
MalwareBytesSecurity

What is personal information? In legal terms, it depends

Credit to Author: David Ruiz| Date: Thu, 11 Apr 2019 17:03:02 +0000

What exactly is the “personal information” that companies need to legally protect? Learn which data points organizations need to secure, from Social Security numbers to olfactory, smell-based data (!), to comply with the law.

Categories:

Tags:

(Read more…)

The post What is personal information? In legal terms, it depends appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Credit to Author: Eric Avena| Date: Thu, 11 Apr 2019 15:00:41 +0000

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.

The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security.

Read More
ComputerWorldIndependent

You Can Now Get This Award-Winning VPN For Just $1/month

Credit to Author: DealPost Team| Date: Wed, 10 Apr 2019 12:33:00 -0700

If you use the internet (which you clearly do), you likely know how important it is to protect your data in an increasingly dangerous cyber environment. But like other essential tasks that tend to be tedious (like filing taxes early and brushing your teeth for the full two minutes), most installing and running a VPN can sound unappealing to many: sure, they encrypt your internet traffic and hide your location — but they can also run frustratingly slowly, delaying the way you’d usually use the internet for entertainment and work.

That’s where Ivacy VPN is different: not only will the speedy service let you browse and stream lag-free, it also offers real-time threat detection technology, removing malware and viruses at the server level. It ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced.

To read this article in full, please click here

Read More
MicrosoftSecurity

Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data

Credit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 19:00:42 +0000

Microsoft and Forcepoint are working closely to develop an integrated solution that makes it easy to discover, classify, label, and protect critical business data.

The post Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data appeared first on Microsoft Security.

Read More