Business

SecurityTrendMicro

Simplifying and Prioritizing Advanced Threat Response Measures

Credit to Author: TJ Alldridge| Date: Thu, 23 Aug 2018 12:09:31 +0000

I had to go to the doctor the other day because I was miserable and sick. I don’t like going to the doctor so I waited until my stuffy nose and congestion turned into a full blown sinus infection. The doctor said this thing was going around, and I should be better in a few…

The post Simplifying and Prioritizing Advanced Threat Response Measures appeared first on .

Read More
MalwareBytesSecurity

The enemy is us: a look at insider threats

Credit to Author: Jovi Umawing| Date: Mon, 20 Aug 2018 16:42:50 +0000

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. Who are the insider threats to organizations? And how can they be stopped?

Categories:

Tags:

(Read more…)

The post The enemy is us: a look at insider threats appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Carrier Grade Security Means … Using Carrier Grade Security

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Wed, 15 Aug 2018 12:05:57 +0000

It’s a common mistake in enterprises to copy-paste security solutions from a peer. Strategies can be recycled, but sadly with even very similar businesses almost always have radically different IT and security requirements. I recall one hospital that looked at a nearly identical peer hospital that was only a few miles away. Much of the…

The post Carrier Grade Security Means … Using Carrier Grade Security appeared first on .

Read More
MalwareBytesSecurity

How to protect your RDP access from ransomware attacks

Credit to Author: Pieter Arntz| Date: Fri, 10 Aug 2018 16:13:18 +0000

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?

Categories:

Tags:

(Read more…)

The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs.

Read More