The End-User Frustration of Password Resets
Published on February 24, 2022
via Tech Genix Ask any user to list the things that frustrate them the most about their employer’s IT department, and password policies are sure to be near the top of the list. Password rage is real, and the typical way in which most organizations…
Don’t Ditch the Password Yet: Countering a Brute Force Attack
Published on February 15, 2022
There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…
Breach Response Shift: More Cyber-Insurance Coverage
Published on February 11, 2022
via Dark Reading Companies are more likely to rely on outside attorneys to handle cyber responses in order to contain potential lawsuits. Meanwhile, cyber insurance premiums are rising but covering less. The face of data breach investigations is changing as companies weigh business factors outside…
What You Need to Know About Data Encryption Right Now
Published on February 4, 2022
via Security Intelligence You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you…
Businesses Suffered 50% More Cyberattack Attempts per Week in 2021
Published on January 28, 2022
Via Dark ReadingCyberattack attempts reached an all-time high in the fourth quarter of 2021, jumping to 925 a week per organization, partly due to attempts stemming from the Log4j vulnerability, according to new data. Check Point Research on Monday reported that it found 50% more…
Small Business Cybersecurity: What to Fix, What to Manage, and What to Outsource
Published on January 19, 2022
via Security Intelligence The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the…
The Top 5 Cybersecurity Tools to Implement Right Now
Published on January 11, 2022
via Infosecurity Magazine Since the beginning of the pandemic, the US Federal Bureau of Investigation (FBI) has reported a 400% increase in cyber-attacks. What’s more, as of July 31 2021, the FBI has reported a 62% increase in reported ransomware incidents since the beginning of the year as…
The Advantages of Using Data Encryption to Protect Data
Published on January 6, 2022
via Enterprise Security Magazine As data breaches continue to make headlines, more businesses rely on encryption technologies to safeguard their critical assets, both at rest and in transit. Data encryption is the process of converting data to another format or code to restrict access to…
What’s in Store for Cybersecurity in 2022
Published on December 14, 2021
Via Security Week The past year has been quite challenging and tiring for many IT and security professionals, as threat actors capitalized on the rapidly changing environment created by accelerated digitalization and cloud transformation in response to the COVID-19 pandemic. And while we all hope…
Bosses are Reluctant to Spend Money on Cybersecurity. Then They Get Hacked.
Published on December 8, 2021
Via ZDNet Preventing a cyberattack is more cost-effective than reacting to one - but many boardrooms still aren't willing to free up their budget. Many businesses still aren't willing to spend money on cybersecurity because they view it as an additional cost – and then…