How to create an intentional culture of security

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Oct 2017 18:00:48 +0000

A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We’ll show you how.

Categories:

Tags:

(Read more…)

The post How to create an intentional culture of security appeared first on Malwarebytes Labs.

Read more

BYOD, why don’t you?

Credit to Author: Pieter Arntz| Date: Thu, 19 Oct 2017 17:16:16 +0000

Allowing your staff to BYOD has mutual benefits for employees and company, but to keep everyone happy and safe, there are some precautions you should be taking.

Categories:

Tags:

(Read more…)

The post BYOD, why don’t you? appeared first on Malwarebytes Labs.

Read more

Trend Micro Top Again for Breach Detection, Says NSS Labs

Credit to Author: TJ Alldridge| Date: Thu, 19 Oct 2017 15:13:08 +0000

In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate attacks surface grows, offering more opportunities for the bad guys to take aim at highly prized IP and customer data. They also have the element of…

Read more

Phishes, pseudophishes, and bad email

Credit to Author: William Tsing| Date: Mon, 16 Oct 2017 18:00:49 +0000

Everyone knows about phishing. But what about pseudophishing? When companies use poor design, no attribution, and broad requests for personal info, their legit emails look like a phish.

Categories:

Tags:

(Read more…)

The post Phishes, pseudophishes, and bad email appeared first on Malwarebytes Labs.

Read more

Cybersecurity in the Workplace is Everybody’s Business

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 10 Oct 2017 13:00:04 +0000

What can individual users do to preserve cybersecurity at work? Your organization is spending on cybersecurity tools, you have an awareness program, and if you look you will find that there are standards and procedures for choosing and maintaining products to help keep information secure. But what can an individual do? Remember – you are…

Read more

When Phishing Starts from the Inside

Credit to Author: Chris Taylor| Date: Thu, 05 Oct 2017 13:00:54 +0000

Phishing is one of the greatest and most time consuming challenge security professionals face today.A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks in which an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials…

Read more

National Cyber Security Awareness Month for Organizations

Credit to Author: Jon Clay| Date: Mon, 02 Oct 2017 12:00:25 +0000

The month of October 2017 is again the National Cyber Security Awareness Month (NCSAM) for individuals and organizations. This year’s theme is shared responsibility which is something we’ve been talking a lot about when it comes to public cloud support for many years. This year Trend Micro will be supporting NCSAM with a new blog…

Read more