article thumbnail

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

The Last Watchdog

SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. Network segmentation and multiple layers of encryption might have perturbed the attackers in some of the more recent high profile hacks. Your people make all the difference.

Hacking 229
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Breach: Millions of Phone Numbers, Recordings, and Call Logs Compromised in Ringostat Data Leak

Security Affairs

There was no need for a password or login credentials to access the information, and the data was not encrypted. The voice recording information could be accessed by anyone with a link and an Internet connection, leaving millions vulnerable. The leaked data numbers in the millions and was accessible to anyone who possessed the link.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Supports Business to Business (B2B), Business to Consumer (B2C) and Business to Employee (B2E) activities (e.g., Password vaults, also described as password managers, are encrypted vaults that digitally store usernames and passwords. A VPN provides a secure, encrypted connection over the Internet from a device to a network.

article thumbnail

McAfee Enterprise & FireEye 2022 Threat Predictions

McAfee

After all, it does demand a level of research to “hook” the target into interactions and establishing fake profiles are more work than simply finding an open relay somewhere on the internet. Shodan hadn’t had time to scan the full Internet). In summary: patched in the Spring, exploited in the Fall.

article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Cloud-based applications and services can be accessed from anywhere via an internet connection, facilitating seamless collaboration among remote workers. For example, setting overly permissive access controls can inadvertently expose sensitive data to the public internet or unauthorized users.

article thumbnail

Spinbackup GDPR Compliance

Spinone

GDPR will replace the 1995 EU Data Protection Directive , which was introduced two decades ago when the Internet has not yet revolutionized business communications. At Spinbackup we welcome the General Data Protection Regulation (GDPR) enforcement for B2B markets as it is individuals who handle business relationships. GDPR Overview.

B2B 40