article thumbnail

Penetration Testing Remote Workers

SecureWorld News

With many organizations now planning their annual penetration tests ("pentest" for short), a change is needed in order to accommodate remote workers. It also begs what are you allowed to test versus what is now considered taboo considering end-users may be operating with their own personal equipment?

article thumbnail

DNA testing company fined after customer data theft

Malwarebytes

million customers who had undergone genetic testing across the US. The company will pay a total fine of $400,000 for Ohio and Pennsylvania—and has promised to tighten its information security. DDC said it conducts both inventory assessment and penetration testing on its systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Amid an Embarrassment of Riches, Ransom Gangs Increasingly Outsource Their Work

Krebs on Security

There’s an old adage in information security: “Every company gets penetration tested, whether or not they pay someone for the pleasure.” In conducting research for this story, KrebsOnSecurity learned that Dr. Samuil is the handle used by the proprietor of multi-vpn[.]biz ” WHO IS DR. SAMUIL?

article thumbnail

15 Cybersecurity Measures for the Cloud Era

Security Affairs

Hackers are constantly finding new ways to exploit vulnerabilities in software, so it’s important to make sure you have the latest security patches installed. When you access the internet through a VPN, your data is encrypted and routed through a secure tunnel. Audits and penetration testing.

article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

Secure Communication Channels: When sending sensitive data outside of the company network, use encrypted communication tools (such as secure email and messaging applications). Multi-Factor Authentication (MFA): Increasing the security of your remote access, MFA makes sure that users provide more than simply a password.

article thumbnail

Experts found backdoors in a popular Auerswald VoIP appliance

Security Affairs

The backdoors were discovered as part of penetration testing, they allow attackers to gain full administrative access to the impacted devices. Instead, use the Auerswald Remote Access or VPN to access remote ICT systems via the Internet.” that was downloaded from the Auerswald support website. . Pierluigi Paganini.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Virtual private networks (VPNs): Secure remote user or branch office access to network resources through encrypted connections to firewalls or server applications. Virtual desktop infrastructure (VDI): Replaces VPN or remote desktop access with virtual desktops in fully controlled environments with additional protections.