What you need to know about new data-security rules for business travel

Credit to Author: Mike Elgan| Date: Fri, 15 Nov 2019 07:39:00 -0800

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Read more

Why all organizations must better protect sensitive data

Credit to Author: David Ruiz| Date: Thu, 17 Oct 2019 17:30:04 +0000

The truth is that companies, businesses, and organizations have an obligation to the data that belongs to their employees, users, and customers. For some organizations, that obligation is a matter of real, physical safety.

Categories:

Tags:

(Read more…)

The post Why all organizations must better protect sensitive data appeared first on Malwarebytes Labs.

Read more

Insurance data security laws skirt political turmoil

Credit to Author: David Ruiz| Date: Wed, 25 Sep 2019 22:44:47 +0000

Across the United States, a unique approach to lawmaking has seen radical success in making data security a little bit stronger for one industry—insurance providers.

Categories:

Tags:

(Read more…)

The post Insurance data security laws skirt political turmoil appeared first on Malwarebytes Labs.

Read more

Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more

A week in security (January 7 – 13)

Credit to Author: Malwarebytes Labs| Date: Mon, 14 Jan 2019 16:45:37 +0000

A roundup of last week’s security news from January 7 to 13, including breaches, takedowns, bug fixes, and social media issues.

Categories:

Tags:

(Read more…)

The post A week in security (January 7 – 13) appeared first on Malwarebytes Labs.

Read more

Which Threats had the Most Impact During the First Half of 2018?

Credit to Author: Trend Micro| Date: Mon, 05 Nov 2018 15:00:50 +0000

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

The post Which Threats had the Most Impact During the First Half of 2018? appeared first on .

Read more

How mobile threats impact today’s BYOD landscape

Credit to Author: Trend Micro| Date: Mon, 23 Jul 2018 18:56:36 +0000

Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,…

The post How mobile threats impact today’s BYOD landscape appeared first on .

Read more

5 errori di sicurezza che il vostro team IT non vorrebbe che faceste

Credit to Author: Sophos Italia| Date: Fri, 13 Oct 2017 05:54:22 +0000

In occasione del National Cybersecurity Awareness Month (NCSAM) questa settimana trattiamo il tema della Cybersecurity sul posto di lavoro. <img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=43430&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/pjZKRYpBZyo” height=”1″ width=”1″ alt=””/>

Read more