All the Ways US Government Cybersecurity Falls Flat

Credit to Author: Lily Hay Newman| Date: Thu, 24 Aug 2017 13:00:00 +0000
A new study shows not only that federal cybersecurity is as dismal that you thought, but why.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Thu, 24 Aug 2017 13:00:00 +0000
A new study shows not only that federal cybersecurity is as dismal that you thought, but why.
Read MoreCredit to Author: Trend Micro| Date: Wed, 23 Aug 2017 23:30:55 +0000
Phishing is one of the greatest and most time-consuming challenges security professionals face today.
Credit to Author: Dana Torgersen| Date: Wed, 23 Aug 2017 19:04:56 +0000
![]() | |
| 4 key steps you can take within your business to help gain trust with your employees while educating them to make more secure decisions. Categories: Tags: businessCTNTcybercrime tactics and techniquescybercriminalscybersecuritysecurity |
The post 4 Steps for improving employee trust while securing them appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Igor Kuksov| Date: Wed, 23 Aug 2017 13:00:38 +0000
Modern technology actually helps phone scammers — what you need to know to stay safe.
Read More
Credit to Author: Richard Hoffman| Date: Wed, 23 Aug 2017 03:11:00 -0700
It used to be that the most intrusive experience business travelers faced at airport security was a possible pat-down, or a customs check of luggage. These days, border control agents are searching passengers’ phones, tablets and laptops for … well, anything they want to see. Your complying with the request grants them access to documents, emails, passwords, contacts and social media account information. So travelers carrying confidential or privileged corporate information (in addition to the merely personal) need to take steps ahead of time to ensure that private data stays private.
The laws around data privacy at checkpoints are murky, and border control officers in the U.S. and elsewhere have been making full use of the allowable gray areas, asking travelers to turn over email logins and social media passwords, searching devices and making forensic copies of data. If this concerns you and your company, these tips could prove useful. While legal issues vary by country, most of these suggestions will provide a measure of data security in a variety of situations.
To read this article in full or to leave a comment, please click here
Credit to Author: Trend Micro| Date: Tue, 22 Aug 2017 21:06:51 +0000
Mobile devices are increasingly being targeted by ransomware attacks, but employees and businesses simply aren’t taking enough action to secure them.
Credit to Author: Trend Micro| Date: Tue, 22 Aug 2017 20:53:43 +0000
While not seen in many headlines currently, targeted attacks continue to pose a threat to today’s enterprises, and it’s imperative that those in charge of the enterprise’s security keep this risk in mind.

Credit to Author: Ashley Feinberg| Date: Tue, 22 Aug 2017 15:27:08 +0000
White supremacist message board users has taken issue with the alt-right, in an echo of past divisions.
Read More