article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

By exploiting weak server vulnerabilities, the Iran-based hackers were able to gain access, move laterally, encrypt IT systems, and demand ransom payment. On a Sunday in February 2018, the Colorado CISO’s office set up a temporary server to test a new cloud-based business process. clinical labs company September U.S.

VPN 117
article thumbnail

Q&A on 90 Day Certificates. You asked – Sectigo Responds!

Security Boulevard

For CISOs and their teams, this step toward even shorter certificate lifespans represents a significant change in how they will approach establishing digital trust. How will this impact SSL certificates that are used for AS2 Signing/Encryption payload certificates that cannot be automated?

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege). Protect your business from cyber assaults and never assume that cyber risk management occurs on its own!