Tag: Security on TechRepublic

Top 5 remote access threats

When working from home, it’s important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.   Advertise on IT Security News. Read the complete article: Top 5 remote access threats

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article: Coronavirus:…

How to create a Kubernetes security policy

If you’re looking to take your Kubernetes security to the next level, you’ll want to start working with pod security policies. Here’s a quick introduction to this feature.   Advertise on IT Security News. Read the complete article: How to…

How to enable 2FA for groups in Nextcloud

Nextcloud allows you to enforce groups to use two-factor authentication. Let’s find out how to create a group and then add them to 2FA enforcement.   Advertise on IT Security News. Read the complete article: How to enable 2FA for…

How to sync Firefox containers across devices

If you make use of the Firefox Multi-Container Account add-on, it now includes the ability to sync your customizations across your Firefox account.   Advertise on IT Security News. Read the complete article: How to sync Firefox containers across devices

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article: Coronavirus:…

Top 5 tips for securely working from home

As working from home becomes more common for tech workers, ensuring proper security measures is important. Tom Merritt offers five security tips for employees working from home.   Advertise on IT Security News. Read the complete article: Top 5 tips…

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article: Coronavirus:…

3 ways to revamp the hiring process for cybersecurity jobs

Deloitte expert recommends using tactics to compete for the pool of security pros, including offering new incentives like student loan repayment.   Advertise on IT Security News. Read the complete article: 3 ways to revamp the hiring process for cybersecurity…

3 ways to revamp the hiring process for cybersecurity jobs

Deloitte expert recommends using tactics to compete for the pool of security pros, including offering new incentives like student loan repayment.   Advertise on IT Security News. Read the complete article: 3 ways to revamp the hiring process for cybersecurity…

How to create a Kubernetes security policy

If you’re looking to take your Kubernetes security to the next level, you’ll want to start working with pod security policies. Here’s a quick introduction to this feature.   Advertise on IT Security News. Read the complete article: How to…

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article: Coronavirus:…

IT security report finds 97% have suspicious network activity

The suspicious network activities revealed in the research by Positive Technologies are traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying.   Advertise on IT Security News. Read the complete article: IT security report finds 97%…

How a Nigerian cybercriminal earned more than $100,000

A savvy operator in Nigeria has bought items with stolen credit cards and used phishing and malware attacks to earn a healthy income, according to cybersecurity provider Check Point.   Advertise on IT Security News. Read the complete article: How…

How to protect yourself from coronavirus-themed malware

Attackers are using phishing emails, ransomware, and malicious apps to target people curious about the virus, says security firm Cybereason.   Advertise on IT Security News. Read the complete article: How to protect yourself from coronavirus-themed malware

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article: Coronavirus:…

How to enable 2FA on a per-user basis in Nextcloud

If you want to enable two-factor authentication for Nextcloud on a per-user basis, it’s just a simple app installation away.   Advertise on IT Security News. Read the complete article: How to enable 2FA on a per-user basis in Nextcloud

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article: Coronavirus:…

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article:…

How world leaders use big data

It’s a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum’s director weighs in.   Advertise on IT Security News. Read the…

10 best practices for using Windows servers

Follow these tips to keep your Windows-based servers operating smoothly, securely, and efficiently.   Advertise on IT Security News. Read the complete article: 10 best practices for using Windows servers

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.   Advertise on IT Security News. Read the complete article:…

COVID-19: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips about remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news.   Advertise on IT Security News. Read the complete article: COVID-19: What…

Almost half of mobile malware are hidden apps

Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android’s accessibility features, according to a McAfee report.   Advertise on IT Security News. Read the complete article: Almost half of mobile malware are hidden apps

7 security tips for IoT systems

Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack.   Advertise on IT Security News. Read the complete article: 7 security tips for IoT systems

Data security: 5 problems and solutions

When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report.   Advertise on IT Security News. Read the complete article: Data security: 5 problems and solutions

How to create a Linux user that cannot log in

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.   Advertise on IT Security News. Read the complete article: How to create a Linux user that cannot…