The search found 3914 results.
Blog Post
The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% of the entire United States workforce works from home at least half of the time. This introduces a significant security challenge for network managers.
Blog Post
Active Directory (AD) is so ubiquitous on Windows networks that many organizations have not invested time optimizing the tool. However, this consideration is critical. Your AD configuration has significant process and network security implications, so it’s important that you prioritize a review of how you’re currently managing the service. Here are a few guidelines to follow as you assess your current set up:
DO
Blog Post
Though the days of robbing banks aren’t over, the attacks on the financial services sector have definitely evolved. Instead of coming up with an elaborate plan that includes avoiding the inevitable security cameras outside a bank, people with malicious intent are choosing a route that gives them access to a wealth of information from to comfort of their home, a cyberattack.
Blog Post
For many, creating a password starts with something easy. A pet’s name, a birthday, some even simply settle for the simple “password.” The truth is, any easy to remember password is likely easy to guess.
Blog Post
We live in a world that wants to connect everything and anything that it can to the Internet, and because of this, it seems that everything we buy today is “smart”— our fridges, our phones, and even our wearable devices.
Blog Post
At the beginning of 2018, experts in the cybersecurity field predicted that bad actors attacking surfaces would continue to be a huge trend. Along the same lines, it’s widely accepted that hackers will take the easiest route available to either breach data, place a form of malware on a network, or just cause disruption.
Blog Post
With the attack on the City of Atlanta, hackers targeting critical infrastructure shouldn’t come as a shock. Long gone are the days of hackers only targeting credit card information; they are looking to disrupt the things we take for granted—and right now hackers are feeding off third-party access to critical infrastructure.
Blog Post
If you have already moved on from the Saks Fifth Avenue and Lord & Taylor breach that broke earlier this week affecting 5 million credit cards, don’t worry, another breach happened to other well-known corporations. This breach affected more people and their personal information, and it all stemmed from a third party.
Blog Post
Grab a burger at Sonic or roast beef sandwich from Arby’s and watch a new episode streaming on Netflix in your hotel room—what do these consumer-related activities have in common? Each retail business was hacked through a third party connection in the last year.
Blog Post
A recent study indicated that healthcare data breaches are at a four-year low. However, this statistic is pretty misleading. Why? Because so far, the number of breaches are pretty on-par with past years.