Security

A company’s data is of the utmost importance, and protecting that data is a big job. Having just the right restrictions on your network (not too little, not too much) is a delicate balance, and new trends such as BYOD are providing unique challenges. These articles cover the implementation of network security at the corporate level, as well as news regarding the latest threats and fixes.


Biggest BYOD Threats: Relaxed Policies and Outdated Devices

These two factors are perhaps the two biggest threats surrounding bring-your-own-device (BYOD) initiatives, argues one cybersecurity expert. This expert also says that BYOD might not be as beneficial as some business leaders think—but there are still some benefits.

SHARE THIS ARTICLE

Robots Are Security Risks, Too

We’ve heard a lot lately about how Internet of Things (IoT) devices are notoriously unsecure and prone to use in cyberattacks. Unfortunately, it turns out that robots, too, are just as plagued by vulnerabilities as IoT devices. Researchers have recently discovered basic security weaknesses in robot software from several vendors.

SHARE THIS ARTICLE

In Cybersecurity Strategy, Better to Know Your Coworkers Than the Enemy

Phishing e-mails are getting more sophisticated, and with so many potential enemies out there, it may be easier to know your coworkers in order to head off attacks. Something as simple as an uncharacteristic turn of phrase or tone can clue people into an e-mail’s illegitimacy.

SHARE THIS ARTICLE

Reducing the BYOD Threat

Employees can benefit greatly from a bring your own device (BYOD) policy, but companies can suffer from all of the cybersecurity risks that naturally come with it. While it may not be possible to entirely eliminate these risks, there are plenty of ways for IT leaders to reduce or at least control them.

SHARE THIS ARTICLE

Yes, a Drone Stole Data from a Blinking LED

As IT leaders well know, it’s getting harder and harder to make pretty much any device secure. It’s getting tougher when even air-gapped systems are vulnerable. True, it makes hackers work harder, but a recent experiment shows that malware can help a drone read a computer’s blinking LED light through a window.

SHARE THIS ARTICLE

Spot that Phishing E-Mail Before It Catches You

Most tech-savvy people think they’re clever enough to recognize a phishing attempt—and they should think again. Cyberattacks are getting smarter and criminals’ phishing skills are getting better. Here are some tips that can help you avoid a costly (and embarrassing) error.

SHARE THIS ARTICLE

You Won’t Be Able to Hide from These Hacks

By Roger A. Grimes

Companies seem to be rushing Internet-connected products so quickly to the market that they are not stopping to think about whether they should. The Internet of Things (IoT) is far from secure, and the proliferation of unsecured devices in every area of our lives is going to have consequences far beyond the digital realm.

SHARE THIS ARTICLE

Keeping the Cloud Safe Isn’t Easy

By Sharon Gaudin

The cloud isn’t the most secure place, as most IT leaders realize—but the problem isn’t really with the cloud itself. A new study reveals that it’s company employees who are the culprits. With shadow IT illicitly working behind the scenes, cloud security is often put in grave danger.

SHARE THIS ARTICLE

Data Breaches Get Complex

By Conner Forrest

In yet another report describing cybersecurity woes, Verizon’s latest Data Breach Digest report claims that data breaches are affecting more parts of organizations and becoming more sophisticated. With attacks becoming more complex, here’s how you and your IT department can respond.

SHARE THIS ARTICLE

Too Many Ransomware Victims Are Paying Up

By Taylor Armerding

Paying a ransom to cybercriminals to unlock your files only encourages them to do it more, experts say. But many victims haven’t left themselves any choice—and it’s fueling ransomware’s explosive growth. Prevention is the key, and sometimes you can get your files back without paying.

SHARE THIS ARTICLE