Cybersecurity Hygiene: 8 Steps Your Business Should be Taking
Whether you’re managing your enterprise’s cybersecurity or you’ve outsourced it to a service provider, you’re ultimately the one that will be held accountable for a data breach. If your vendor loses your data, your customers and board of directors will likely still hold you responsible. McAfee’s recent report, Grand Theft Data II: The Drivers and […] more…Ready, Set, Shop: Enjoy Amazon Prime Day Without the Phishing Scams
Amazon Prime Day is becoming one of the hottest shopping periods for the summer. However, it is also becoming one of the hottest opportunities for cybercriminals, as hackers target shoppers in a number of ways during peak shopping moments to steal personal data or financial information. In fact, researchers at McAfee Labs have uncovered a phishing […] more…Is Cloud Service Provider-Native Security ‘Good Enough’ For Your Cloud Transformation Program’s Goals?
Several times lately, CIOs and CISOs have asked me why the security toolset they get for “free” from their cloud service providers isn’t enough. Sure, it might not be the best … but isn’t it good enough for the program’s success? It’s true that we don’t often need the Cadillac.But cloud programs are failing at high […] more…Catch a Ride Via Wearable
More often than not, commuters and travelers alike want to get to their destination quickly and easily. The advent of wearable payments helps make this a reality, as passengers don’t have to pull out a wallet or phone to pay for entry. Adding to that, users are quickly adopting wearable technology that has this payment […] more…RDP Security Explained
RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or “Bluekeep.” The blog highlights a particular vulnerability in RDP which was deemed critical by Microsoft due to the fact that it exploitable over a network connection without authentication. These attributes make it particularly ‘wormable’ – […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…Improving Cyber Resilience with Threat Intelligence
According to the SANS CTI 2019 survey results, 72% of organizations either consume or produce Threat Intelligence. Although most organizations have Intelligence data, they struggle with defining requirements and managing Cyber Threat Intelligence (CTI) as a program with measurable output. This likely results from threat data and intelligence being perceived as a technical function unrelated […] more…1.1M Emuparadise Accounts Exposed in Data Breach
If you’re an avid gamer or know someone who is, you might be familiar with the retro gaming site Emuparadise. This website boasts a large community, a vast collection of gaming music, game-related videos, game guides, magazines, comics, video game translations, and more. Unfortunately, news just broke that Emuparadise recently suffered a data breach in […] more…Say So Long to Robocalls
For as long as you’ve had a phone, you’ve probably experienced in one form or another a robocall. These days it seems like they are only becoming more prevalent too. In fact, it was recently reported that robocall scams surged to 85 million globally, up 325% from 2017. While these scams vary by country, the […] more…Have Fun in the Sun this Summer with the Summer Safety #RT2Win Sweepstakes!
The school year has come to an end, and with it comes the start of summer! For many, this time of year brings excitement and anticipation to jet-set off to their favorite destinations and spend some quality time with family. But while many are soaking up the sun or sharing fun photos online, cybercriminals also […] more…Study: Fortnite Game Becoming the Preferred Social Network for Kids
According to a study recently released by National Research Group (NRG), the wildly popular video game Fortnite is growing beyond its intended gaming platform into a favored social network where kids go daily to chat, message, and connect. The study represents the most in-depth study on Fortnite to date and contains essential takeaways for parents trying […] more…4 Tips to Protect Your Information During Medical Data Breaches
As the companies we trust with our data become more digital, it’s important for users to realize how this affects their own cybersecurity. Take your medical care provider, for instance. You walk into a doctor’s office and fill out a form on a clipboard. This information is then transferred to a computer where a patient […] more…A Robust Federal Cybersecurity Workforce Is Key To Our National Security
The Federal government has long struggled to close the cybersecurity workforce gap. The problem has continued to get worse as the number of threats against our networks, critical infrastructure, intellectual property, and the millions of IoT devices we use in our homes, offices and on our infrastructure increase. Without a robust cyber workforce, federal agencies […] more…What You Can Do to Reduce Your E-Waste This World Environment Day
Our love of technology and often biological need for new devices has created one of the biggest environmental issues of our time – e-waste. Today is World Environment Day – a great opportunity to ensure we are doing all we can to minimise landfill and protect our precious environment. Over the last 12 months, BYO […] more…Don’t Let Airbnb Scams Stop Your Summer Travel Plans
With summertime just around the corner, many people are planning vacations to enjoy some much-needed R&R or quality time with family and friends. Airbnb offers users a great alternative to a traditional hotel experience when they are looking to book their summer getaways. However, it appears that cybercriminals have used the popularity of the platform […] more…RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability CVE-2019-0708
During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP). What was unique in this particular patch cycle was that Microsoft produced a fix for Windows XP and several other operating systems, which have not been supported for security updates in years. So why the […] more…More information
- SSL vs. Website Security
- Spies, Hackers, Informants: How China Snoops on the West
- YouTube, Twitter and Facebook face curbs on hate speech videos
- Linux Variant of Cl0p Ransomware Emerges
- How to keep ransomware from human resources
- Young Pirate pulls off Wi-Fi privacy prank – sucks in security experts
- Students crack Australian state transport system
- Android security: Nearly third of owners don’t use a lockscreen passcode
- Australian Steel Maker BlueScope Hit by Cyberattack
- Beyond BlackBerry: 3 steps to prepare for its demise