The Twitter hacker’s virtual court hearing was zoombombed proving that in the era of virtual communication, simple administrative settings are the key to mitigating intruders.
False Alarm: Samsung’s Fingerprint Sensor “Issue” Wasn’t a Security Flaw After All
False alarm: Last week’s Samsung in-display fingerprint scanner scare was caused by a cheap screen protector, not a security flaw in the Note 10 and S10.
LastPass Security Bug Fix Released — Users Should Update Now
The LastPass security bug has been fixed, but users should update now anyway, making sure they are running version 4.33.0. Note that this bug was limited to Google’s Chrome and Microsoft’s Opera browsers, but the fix developed was sent to all browsers. Password managers, while not infallible, are an important part of keeping passwords—and businesses—safe.
Capital One Breach — A Terrible, Horrible, No Good, Very Bad Day
The Capital One breach is a terrible, horrible, no good, very bad day for the brand, and just another day of exposure and personal risk for consumers. There’s a reason that every major tech brand is focused on cybersecurity: Dell, IBM, Cisco, SAP, and others understand fully that business can’t be business as usual if customers are vulnerable to hacks. Now we just need to move cybersecurity up the food chain so that it’s a top concern from senior management and the boardroom on down—and fund it.
Fast-Growing Startup in the SIEM Space No Real Threat to Splunk, IBM
Exabeam, a fast-growing startup in the SIEM (Security Information and Event Management) space is no real threat to Splunk, IBM. Here’s why.
Why Building a Security First Culture is Business-Critical
In the smart, connected, and increasingly automated landscape businesses operate in today, the risk of exposure of sensitive data or infiltration by cyber criminals is becoming ever more prevalent. The increasing use of cloud services and third-party integrations are exposing companies to risks with the potential to disrupt operations, erode consumer trust, and ultimately damage business reputations to the detriment …
How to Identify a Phish and How to Protect Against Phishing
Holiday season means phishing season, and that’s not the good kind of fishing that you do while you’re relaxing out on the lake—it’s the cybersecurity nightmare kind of phishing and it poses big risks for businesses of all sizes. My guest on the Converge TechTalk show today is Mison Riggins from Inspired eLearning and we’re talking about cybersecurity and the …
CyberSecurity—The Greatest Challenge CISOs Face Today
What a time to be alive! The rapid advances of technology and dawn of an era dominated by the Internet of Things (IoT) has changed pretty much everything about life as we know it. Which is why it’s no surprise that cybersecurity is perhaps the greatest challenge CISOs face today. But let’s back up. Why is the IoT such a …
Here’s How to Kickstart Your Data Protection Strategy
Many business leaders associate data protection with cyberattacks. Mainly, due to the alarming news stories that continue to surface—from the WannaCry ransomware attack that spread across 150 countries to Equifax’s massive breach that affected as many as 147.9 million consumers. Luckily, media coverage for these incidents has spurred much-needed awareness for data security. However, cyberattacks are just one concern when it …
Gain Peace of Mind with Remote Monitoring and Management (RMM)
How would your company benefit from having a Remote Monitoring and Management system and why should it be part of your strategy? Let’s explore.