Bring your own security (BYOS): good idea or not?

Credit to Author: Pieter Arntz| Date: Tue, 02 Oct 2018 15:00:00 +0000

We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.

Categories:

Tags:

(Read more…)

The post Bring your own security (BYOS): good idea or not? appeared first on Malwarebytes Labs.

Read more

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 15 May 2018 16:00:24 +0000

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and data to prevent accidental data leakage. With 600 million active Windows 10 devices, corporate customers

Read more

Read more

Physician, protect thyself: healthcare cybersecurity circling the drain

Credit to Author: Jovi Umawing| Date: Thu, 15 Feb 2018 16:00:00 +0000

Study after study reveals that healthcare cybersecurity breaches are on the uptick. In this blog series, we’ll look into the reasons why healthcare cybercrime is trending, understand the motivations of threat actors behind it, and discuss what the healthcare industry can do to care for itself and the people they swore to protect.

Categories:

Tags:

(Read more…)

The post Physician, protect thyself: healthcare cybersecurity circling the drain appeared first on Malwarebytes Labs.

Read more

A massive security flaw discovered in Skype. Fix not coming anytime soon.

Credit to Author: Shriram Munde| Date: Wed, 14 Feb 2018 09:10:30 +0000

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this…

Read more

Security Glue Between the Silos of Endpoint, Server, Cloud and Network Security Gets More Critical

Credit to Author: Greg Young| Date: Thu, 08 Feb 2018 17:59:01 +0000

Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to become Endpoints, as mobile devices proliferated and they were assembled into a collective of being in the category of not-a-server. But as practitioners know, it isn’t…

Read more

A week in security (October 16 – October 22)

Credit to Author: Malwarebytes Labs| Date: Mon, 23 Oct 2017 17:24:14 +0000

A compilation of notable security news and blog posts from Monday, October 16 to Sunday, October 22. We talked about adware and malware in Google Play, a ransomware exclusively targeting South Korea, BYOD, a new 419 scam, cyptocurrency mining, and more.

Categories:

Tags:

(Read more…)

The post A week in security (October 16 – October 22) appeared first on Malwarebytes Labs.

Read more

BYOD, why don’t you?

Credit to Author: Pieter Arntz| Date: Thu, 19 Oct 2017 17:16:16 +0000

Allowing your staff to BYOD has mutual benefits for employees and company, but to keep everyone happy and safe, there are some precautions you should be taking.

Categories:

Tags:

(Read more…)

The post BYOD, why don’t you? appeared first on Malwarebytes Labs.

Read more