Remove B2B Remove Encryption Remove Internet Remove Risk
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. How can companies minimize risks? Regular training and simulations can help reduce risks associated with human errors.

article thumbnail

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

The Last Watchdog

SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. Dornbush: The big takeaway is that third-party risk is real and not likely to be measurable via a standard form or checklist. Your people make all the difference.

Hacking 228
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Working from home resulted in additional risk management and security challenges for employees, executive leadership, and information technology (IT) teams. The concept of a static login for all user activities is not enough to address the evolving risk landscape where businesses operate. SSO has several benefits and use cases.

article thumbnail

Data Breach: Millions of Phone Numbers, Recordings, and Call Logs Compromised in Ringostat Data Leak

Security Affairs

There was no need for a password or login credentials to access the information, and the data was not encrypted. The voice recording information could be accessed by anyone with a link and an Internet connection, leaving millions vulnerable. What Are the Risks and How to Protect Yourself. The leak has since been secured.

article thumbnail

McAfee Enterprise & FireEye 2022 Threat Predictions

McAfee

After all, it does demand a level of research to “hook” the target into interactions and establishing fake profiles are more work than simply finding an open relay somewhere on the internet. Threat actors pay attention to enterprise statistics and trends, identifying services and applications offering increased risk potential.

article thumbnail

Spinbackup GDPR Compliance

Spinone

Data is associated with a significance of risk if it’s stolen or abused. GDPR will replace the 1995 EU Data Protection Directive , which was introduced two decades ago when the Internet has not yet revolutionized business communications. What is GDPR? GDPR Overview. It must be as easy to withdraw consent as it is to give it.

B2B 40
article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Upon further research, records indicated that the database belonged to global B2B CRM provider Really Simple Systems.