Businesses rarely encrypt their email messages because good encryption is too hard to use. That’s changing.
By Randy Battat, PreVeil
Most business-to-business communication involves sensitive information – stuff that the parties really don’t want others to know about. Whether it’s contracts, customer communications, supplier information, dialog with consultants and contractors, or other things, there’s a lot of sensitive information that travels via plain old email.
These emails really should be protected, i.e. encrypted. But the vast majority of B2B communication remains unencrypted, despite wide availability of very good technology and tools. Why? Continue reading
Cybersecurity is one of the most fluid and changing fields of the tech industry. Every year, new threats and challenges emerge, outpacing past records and expectations. In this respect 2016 was no different. But as online services become more and more prominent and critical to our daily lives and businesses, being able to respond to threats before they deal their damage becomes more critical.
Case in point: The October 21 DDoS attack against Dyn cut millions of users from popular services such as Twitter and Netflix. That is something that most people can shrug off. But what happens when our cars, homes, hospitals and power grids depend on the correct functionality of our digital and online systems?
Cybersecurity expert Lenny Zeltser believes that new approaches to fighting malware can give a leg up in fighting cyberattacks and help organizations stay ahead of cybercriminals. Continue reading
We’ve been saying this for many years: This year’s cyberattacks dwarfed last year’s. And in this regard, 2016 was no exception. From online fraud to account takeovers and data breaches, and everything else, attacks were dished out in bigger sizes and higher frequencies than before.
Some trends such as ransomware and DDoS attacks dominated the headlines, but that was not all 2016 had in stock. While experts might differ on which were the biggest hacks of the year, there’s no denying that the following four cases were really unprecedented in their own kind. Continue reading
By Gary Southwell, Seceon
The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats: “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading
By Michael Conley
Your internet security is something that must be constantly kept under control, but unfortunately for us, this is no easy task. As time goes by, cybercriminals are finding more and more ways to slither their way into our devices and get a hold of our personal information, which is not an encouraging thought.
Thankfully, with some light research and caution, we can avoid much of internet’s threats and browse the web safely, which is why we will provide you with some tips on how to do it right. These are simple rules of conduct to follow and once you get the hang of it, you’ll see that staying secure online doesn’t have to be hard work. Continue reading
By Ken Wilson, ThePCDoctor
The world today is more connected than ever, and it will keep going that way. This leaves us open to cyber-attacks and our personal data at risk more than ever. There are myths about security that you should not believe because it leaves you open to these attacks. Continue reading
As if I haven’t said it a million times, IoT security is critical.
But just when I thought I had it all figured out, somebody comes along and sheds new light on this very important topic in a different way.
At a November 16 hearing held by the Congress Committee on Energy and Commerce in light of the devastating October 21 Dyn DDoS attack, famous cryptologist and computer security expert Bruce Schneier offered a new perspective on IoT security, which makes it easier for everyone to understand the criticality of the issue. Continue reading