Sat.Oct 22, 2016 - Fri.Oct 28, 2016

article thumbnail

Experts share their cybersecurity horror stories

Tech Republic Security

From IoT hacks to economic collapse, four security executives share their scariest hacking and attacking scenarios and shine a light on emerging cyber-threats.

IoT 168
article thumbnail

Top 5 Causes of Data Loss. Google Workspace Security Tips

Spinone

Data loss should not be considered as an avoidable accident, as it is almost inevitable that any type of business may be exposed to data loss risks. This article presents cybersecurity tips on the top 5 causes of data loss. Instead, it’s important to have an action plan in place that considers all different risks […] The post Top 5 Causes of Data Loss.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lessons Learned: E-Learning Company Faces $50,000 Spam Fine

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has issued its first Compliance and Enforcement Decision* under Canada’s Anti-Spam Law (CASL). The Commission […].

article thumbnail

Social Engineering – The Mental Game, Part II.

NopSec

Now, let’s talk technical. Malicious executable are used to deliver a payload to a victim. These can be very technical packages that can be used for remote access to the victim’s host or can be much simpler making the attack footprint and code smaller by simply prompting the user for a response. Email attachments are one of the best known social engineering attack vectors.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Delete unused Android apps now, or risk a security nightmare

Tech Republic Security

Your Android device most likely contains unused apps that could still use data or fall prey to vulnerabilities. The solution to this potential security problem: delete those apps.

Risk 168
article thumbnail

Top 5 Causes of Data Loss. G Suite Security Tips

Spinone

Data loss should not be considered as an avoidable accident, as it is almost inevitable that any type of business may be exposed to data loss risks. This article presents cybersecurity tips on the top 5 causes of data loss. Instead, it’s important to have an action plan in place that considers all different risks and scenarios and ensures that any lost data can be restored quickly in the event of a data loss disaster.

Backups 40

LifeWorks

More Trending

article thumbnail

10 programs to help you break into a cybersecurity career

Tech Republic Security

Eighty-two percent of IT professionals report a shortage of cybersecurity skills at their company. Here are 10 programs spanning all education levels to help you get your start in the field.

article thumbnail

3 inexpensive steps to secure IoT

Tech Republic Security

IoT devices powered the attack against Dyn, causing major disruptions to certain web properties. Follow these three steps to secure your IoT devices.

IoT 167
article thumbnail

Why big data leaders must worry about IoT security

Tech Republic Security

The security risks associated with IoT devices cannot be ignored. If your big data plans include IoT devices, follow these four steps to reduce your chances of a security breach.

Big data 167
article thumbnail

Dyn DDoS attack: 5 takeaways on what we know and why it matters

Tech Republic Security

On October 21, a Distributed Denial of Service attack on Dyn took many key web properties such as Twitter and Netflix offline. Here are some more details on the attack and the breadth of its impact.

DDOS 168
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Interview with a hacker: S1ege from Ghost Squad Hackers

Tech Republic Security

Ghost Squad Hackers has emerged as one of the world's most influential indie hacking teams. S1ege, the group's 'administrator,' explains his tactics, how the group works, and the ethics of hacking.

Hacking 167
article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

article thumbnail

Report: Android and iOS apps both leak private data, but one is definitely worse for the enterprise

Tech Republic Security

iOS apps are actually leaking more data than Android apps, with one important qualifier: The countries where the most leaks are happening.

167
167
article thumbnail

Hackable heart implants: St. Jude comes under fire for security risks

Tech Republic Security

In an ongoing legal battle between St. Jude and Muddy Waters and MedSec, new filings claim that devices created for heart issues are vulnerable to cyberattacks.

Risk 167
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Aerohive's new IoT security solution could have blocked Dyn DDoS attacks, company claims

Tech Republic Security

Aerohive Networks recently unveiled a new security offering to protect against network attacks from compromised IoT devices, including botnets like Mirai.

IoT 166
article thumbnail

Video: 5 things to know about ethical hacking

Tech Republic Security

Tom Merritt explains how white hat hackers keep systems safe and secure from their bad guy counterparts.

Hacking 165
article thumbnail

Electronic health records: The new gold standard for cybercriminals

Tech Republic Security

Electronic health record (EHR) systems are being compromised by script kiddies, cybercriminals, self-radicalized threat actors, and nation states. Learn how and why.

165
165
article thumbnail

New Mastercard feature that lets you pay with a selfie coming to North American market

Tech Republic Security

Mastercard will debut Identity Check Mobile, which allows mobile users to verify their identity for mobile payments with a selfie or fingerprint, in North America in early 2017.

Marketing 164
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DDoS defenses emerging from Homeland Security

Tech Republic Security

Public, private, and academic researchers are working on new ways to combat distributed denial-of-service attacks. The recent large-scale attacks are making them even more determined.

DDOS 164
article thumbnail

1Password: The smart person's guide

Tech Republic Security

This comprehensive guide covers all you need to know about 1Password, a leading password management app for Android, iOS, macOS, and Windows.

article thumbnail

How to get KeepPass password protection on Android with Keepass2Android

Tech Republic Security

If you're looking for a best-in-breed password safe for Android, look no further than Keepass2Android.

Passwords 148
article thumbnail

BlackBerry is focusing on security and software with the new DTEK60 phone

Tech Republic Security

BlackBerry's new Android phone is intended to feature security functions a step above the competition.

Software 141
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.