Ransom from Home – How to close the cyber front door to remote working ransomware attacks

Credit to Author: Trend Micro| Date: Wed, 16 Sep 2020 12:27:25 +0000

Coronavirus has caused a major shift to our working patterns. In many cases these will long outlast the pandemic. But working from home has its own risks. One is that you may invite ransomware attacks from a new breed of cyber-criminal who has previously confined his efforts to directly targeting the corporate network. Why? Because…

The post Ransom from Home – How to close the cyber front door to remote working ransomware attacks appeared first on .

Read more

How safe are you while making transactions on the Internet?

Credit to Author: Akuti Ojah| Date: Mon, 17 Aug 2020 05:45:27 +0000

Banking and shopping online have become a reality of our lives now, especially during this time of the pandemic. We all have to agree to the fact that it has made life very convenient. It saves time and effort. However, there have concerns about the safety of online banking. You…

Read more

Have you considered your organization’s technical debt?

Credit to Author: Trend Micro| Date: Tue, 21 Jul 2020 14:54:17 +0000

  Tldr; deal with your dirty laundry. Have you ever skipped doing your laundry and watched as that pile of dirty clothes kept growing, just waiting for you to get around to it? You’re busy, you’re tired and you keep saying you’ll get to it tomorrow. Then suddenly, you realize that it’s been three weeks…

The post Have you considered your organization’s technical debt? appeared first on .

Read more

Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations

Credit to Author: Trend Micro| Date: Mon, 22 Jun 2020 20:35:27 +0000

  Trend Micro is excited to launch new Trend Micro Cloud One™ – Conformity capabilities that will strengthen protection for Azure resources.   As with any launch, there is a lot of new information, so we decided to sit down with one of the founders of Conformity, Mike Rahmati. Mike is a technologist at heart,…

The post Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations appeared first on .

Read more

Trend Micro Guardian: Protecting Your Kids On-the-Go

Credit to Author: Trend Micro| Date: Wed, 10 Jun 2020 10:06:42 +0000

Some smart devices are not limited to use on the home network; for instance, your child’s mobile phone or tablet. Keeping your kids safe on these on-the-go devices means extending your security policies beyond the home. Trend Micro Home Network Security (HNS) makes it easy with its complementary app, Trend Micro Guardian. Guardian integrates with…

The post Trend Micro Guardian: Protecting Your Kids On-the-Go appeared first on .

Read more

This Week in Security News: 5 Reasons to Move Your Endpoint Security to the Cloud Now and ICEBUCKET Group Mimics Smart TVs to Steal Ad Money

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 17 Apr 2020 12:27:06 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about 5 reasons your organization should consider moving to a cloud managed solution. Also, read about a massive online fraud operation that has been mimicking smart…

The post This Week in Security News: 5 Reasons to Move Your Endpoint Security to the Cloud Now and ICEBUCKET Group Mimics Smart TVs to Steal Ad Money appeared first on .

Read more

Shift Well-Architecture Left. By Extension, Security Will Follow

Credit to Author: Raphael Bottion, Solutions Architect| Date: Mon, 13 Apr 2020 18:19:40 +0000

A story on how Infrastructure as Code can be your ally on Well-Architecting and securing your Cloud environment By Raphael Bottino, Solutions Architect — first posted as a medium article Using Infrastructure as Code(IaC for short) is the norm in the Cloud. CloudFormation, CDK, Terraform, Serverless Framework, ARN… the options are endless! And they are…

The post Shift Well-Architecture Left. By Extension, Security Will Follow appeared first on .

Read more

COVID-19: How Do I Work from Home Securely?

Credit to Author: Trend Micro| Date: Tue, 31 Mar 2020 12:42:06 +0000

The coronavirus pandemic—the infection officially designated as COVID-19—is causing upheaval across the globe. Aside from the serious economic and public health implications, one very practical impact of shelter-in-place dictums is to force many companies to support remote working where they can. The most recent data tells us that in 2017, eight million Americans worked from…

The post COVID-19: How Do I Work from Home Securely? appeared first on .

Read more