Social media as a tool for malware propagation, cybercrime, and data loss

Social networking platforms have become a key battleground in the fight against social media malware, cybercrime, and data loss.

2 weeks ago

Information governance: Why you need it, how to do it

Information governance is crucial, not only for compliance and legal reasons, but to maintain data security and to benefit from…

2 weeks ago

How to monitor remote workers without invading their privacy

Even in the post-COVID world, more employees will be working from home. Can businesses monitor their remote workers without compromising…

2 weeks ago

Twitter hack: Everything you need to know about this massive cyberattack

Some of the world’s most influential people were victims of a Twitter account hack. How did this happen? What is…

3 weeks ago

The case against using Microsoft’s Local Administrator Password Solution (LAPS)

Microsoft LAPS makes it easy to securely manage local account passwords of domain-joined computers. But it may also have a…

3 weeks ago

Biometrics authentication: Where the technology is now — and where it’s going

As cyberthreats rise in number and complexity, biometrics authentication technology has seen rapid adoption and growing acceptance by the public.

4 weeks ago

Remote work vulnerabilities: Tips on avoiding a nightmare scenario

Remote work is likely to remain permanent — and so will the vulnerabilities it brings with it. Security must adapt…

4 weeks ago

Got cybersecurity tools? Good. Got too many? That may be a problem

Strength in numbers may not apply to cybersecurity tools. In fact, using too many tools may hinder a company’s ability…

1 month ago

Hakbit ransomware campaign targeting specific European countries

The newly uncovered Hakbit ransomware campaign spread via spear-phishing emails may indicate a shift in the attack methodology of cybercriminals.

1 month ago

Credential stuffing: Everything you need to know to avoid being a victim

Credential stuffing is yet another weapon being used by cybercriminals. Here’s what credential stuffing is — and how you can…

1 month ago