Remove Authentication Remove CSO Remove Encryption Remove Social Engineering
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

If the data is online, then it’s accessible to bad actors and just waiting to be encrypted for ransom. Enable multi-factor authentication (MFA) to access your applications and services, especially for admin access to platforms and backend systems. •Back up your data and secure your backups in an offline location. Let’s talk VPNs.

Risk 247
article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

If I go to a CSO and say, ‘We can secure your APIs,’ he’ll say, ‘Great, can you also find them for me?’ ” observed Dwivedi, Data Theorem’s founder. Instead, what it did was allow anyone with a usps.com account to modify a wildcard search without authentication permissions. And that’s just one phone. Velocity without security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

The FaceTime bug definitely proves that your phone can be used as a remote listening device "without any authentication" — Marcus J. If the US government dictating iPhone encryption design sounds ok to you, ask yourself how you'll feel when China demands the same. Carey (@marcusjcarey) January 29, 2019.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Making matters worse, the cameras employ facial recognition technology, which leads to questions as to whether an attacker could actually identify individuals caught on camera and then pursue them as targets for social engineering schemes or something even more nefarious. When surveillance leads to spying.