Security

ComputerWorldIndependent

Almost half of tested free Android antivirus apps fail. That might prove very useful to IT.

Credit to Author: Evan Schuman| Date: Thu, 08 Aug 2019 03:00:00 -0700

One of the problems with enterprise mobile BYOD efforts is that corporate apps — and lots of corporate data, including sensitive intellectual property — must coexist on the same device with whatever employees choose to download on the personal side. That’s far from ideal, but even worse is if employees choose to download a second antivirus program. Unlike doubling up on most apps (two VPNs, two word processors, two email programs, etc.), antivirus programs often conflict and fight each other, generating false positives and other bad results.

Unlike two deadbolts on a door, doubling up on security not only doesn’t work with antivirus, it can actually sharply weaken security. This all assumes that both antivirus programs are professional, effective and well-intentioned. But that’s often not the case. There are quite a few free antivirus programs out there, and they are disproportionately the ones employees opt to download. After all, if the company has already installed a high-level antivirus on the phone, why would an employee pay to install a second? But a free antivirus program is much more tempting.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Microsoft relaxes telemetry rule for PCs managed with Windows Update for Business

Credit to Author: Gregg Keizer| Date: Wed, 07 Aug 2019 13:12:00 -0700

Microsoft has quietly relaxed a rule that prevented privacy-first organizations from managing the Windows Update for Business (WUfB) service using group policies.

With Windows 10 1903, aka “Windows 10 May 2019 Update,” which debuted in late May, organizations no longer are required to set the “diagnostic data level” for their devices to “Basic” or higher.

That diagnostic data level is a multi-step categorization of what Microsoft pulls from Windows devices and sends to its own servers. Also dubbed “telemetry,” the data harvesting is used by Microsoft for a range of tasks, notably deciding when a specific PC receives a feature upgrade.

To read this article in full, please click here

Read More
SecurityTrendMicro

XDR Needs Network Data and Here’s Why

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 07 Aug 2019 15:56:40 +0000

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of…

The post XDR Needs Network Data and Here’s Why appeared first on .

Read More
SecurityTrendMicro

Digital skimmers: What are they and how can I keep my card details safe online?

Credit to Author: Trend Micro| Date: Wed, 07 Aug 2019 14:05:18 +0000

A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information….

The post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on .

Read More