Cybersecurity is a top concern for most businesses—reports of cyber attacks and data breaches are commonplace in today’s news headlines. One of the most important threats to pay attention to is ransomware. This is a kind of malicious software that threatens to block you from accessing your own files—or even your entire computer or network—until you pay a specified dollar …
To keep your company as safe as possible, it’s important to consider the groups that are most often overlooked when it comes to security awareness training.
The LastPass security bug has been fixed, but users should update now anyway, making sure they are running version 4.33.0. Note that this bug was limited to Google’s Chrome and Microsoft’s Opera browsers, but the fix developed was sent to all browsers. Password managers, while not infallible, are an important part of keeping passwords—and businesses—safe.
Enterprise access control systems have become a target for hackers who look for the easy way in. Here are 4 ways to ensure your system is secure.
To become a ransomware defender, you need to know how this malware works and the basic steps you can take to prevent it from infiltrating your devices and organization.
Symantec reportedly has two new suitors, this time for its very lucrative consumer security business. The takeover deal would value Symantec stock at between $26 and $27 a share, valuing the company at about $16.4 billion. As might be expected, Symantec stock surged on Friday following the news of the possible buyout, jumping 4.5% to $24.52. What’s next here as it relates to the Broadcom acquisition?
Electronic security and cybersecurity cover very different ground, but as technology continues to evolve these teams are starting to work together. Here’s how.
The Capital One hacker indictment is not great news for Amazon’s AWS. Here’s why it’s a credibility knock the company can ill-afford right now in light of the Pentagon’s $10B JEDI cloud services contract that’s in the final stages of vendor selection.
When it comes to electronic security, protection goes beyond the devices and technologies that help keep businesses and people safe. The relationship you establish with your security integration partner plays an important role as well. When making decisions about electronic security strategy and technology, look for a security integration partner who exhibits the intangibles, like trust and transparency. Think about …
The IoT Cybersecurity Improvement Act calls for deployment standards for IoT-connected devices. That’s not only a very smart move for the Federal government, it could have far-reaching implications for the private sector, and for consumers, as well. And that? That’s a very good thing.