This article has been indexed from Security on TechRepublic Only 33% of users surveyed by NordPass changed the default passwords on their IoT devices, leaving the rest susceptible to attack. Read the original article: Why your IoT devices may be…
Tag: Security on TechRepublic
Data Privacy Day 6 months later: A look at privacy trends and solutions
This article has been indexed from Security on TechRepublic Does your company need a head of data privacy, a data breach response plan, blockchain technology or something else to keep its data safe? Here are some challenges and recommendations. Read…
How to control activity tracking by apps on your iPhone or iPad
This article has been indexed from Security on TechRepublic You can tell iOS and iPadOS apps not to track your activity. Here’s how. Read the original article: How to control activity tracking by apps on your iPhone or iPad
Cybersecurity: Watch out for these unique fraudster tricks Loki would be proud of
This article has been indexed from Security on TechRepublic Online fraud is getting sneakier and stealthier as mischievous operatives evolve their techniques. Learn some of the unique tricks afoot today and how to spot them. Read the original article: Cybersecurity:…
6 cybersecurity training best practices for SMBs
This article has been indexed from Security on TechRepublic Cybersecurity training is not the same across all companies; SMB training programs must be tailored according to size and security awareness. Here are an expert’s cybersecurity training tips. Read the original…
How to install fail2ban on Rocky Linux and AlmaLinux
This article has been indexed from Security on TechRepublic Fail2ban should be on every one of your Linux servers. If you’ve yet to install it on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with…
Execs don’t sound very confident about long-term network security in the WFH era
This article has been indexed from Security on TechRepublic After a somewhat clunky initial switch to remote work, it looks like hybrid offices are here to stay; at least for now. But a new report highlights concerns about the long-term…
Execs don’t sound very confident about long-term network security in the WFH era
This article has been indexed from Security on TechRepublic After a somewhat clunky initial switch to remote work, it looks like hybrid offices are here to stay; at least for now. But a new report highlights concerns about the long-term…
FBI and CISA warn of potential cyberattacks this holiday weekend, citing past trends
This article has been indexed from Security on TechRepublic The Labor Day holiday could be prime time for more than just barbecues and closing the pool for the year as the open season on ransomware continues. Read the original article:…
Don’t forget to evaluate soft skills when hiring for cybersecurity positions
This article has been indexed from Security on TechRepublic Soft skills are just as important, if not more so, than technical skills in cybersecurity professionals. People with soft skills can be trained in tech skills, expert says. Read the original…
Identity is replacing the password: What software developers and IT pros need to know
This article has been indexed from Security on TechRepublic Identity and access management is pushing application security past single-factor authentication (a password) and even multi-factor authentication to a risk management model says Ping Identity CEO. Read the original article: Identity…
Ping Identity CEO explains how identity and access management is replacing the password
This article has been indexed from Security on TechRepublic Andre Durand, Founder and CEO of Ping Identity, talks about out how identity and access management is changing software development and application security in this Dynamic Developer episode. Read the original…
A passwordless future isn’t close: It’s here
This article has been indexed from Security on TechRepublic Authentication sans password is already possible and solutions are on the market from companies like Ping Identity. With passwords passé, it’s time to make the leap to better security. Read the…
Roadblocks to autonomous cars: Top 5
This article has been indexed from Security on TechRepublic Tom Merritt tells us about the things that are getting in the way of autonomous car adoption. Read the original article: Roadblocks to autonomous cars: Top 5
Top 5 autonomous car roadblocks
This article has been indexed from Security on TechRepublic Tom Merritt tells us the things that are getting in the way of autonomous car adoption. Read the original article: Top 5 autonomous car roadblocks
Data compliance: “The world is still waking up to the challenges ahead,” expert says
This article has been indexed from Security on TechRepublic Bringing together siloed data from all parts of the business is a huge challenge to IT departments when meeting compliance requirements. Read the original article: Data compliance: “The world is still…
Data privacy, governance and insights are all important obligations for businesses
This article has been indexed from Security on TechRepublic Expert: Information management can also lead to a massive value proposition in being able to tap into governed data for business insights. Read the original article: Data privacy, governance and insights…
Delta variant: Is your IT department ready to go fully remote again due to COVID-19?
This article has been indexed from Security on TechRepublic The delta variant is delaying office reentry plans. For companies going fully remote again, team cohesion, cloud investments and reducing IT burden could be key, according to tech experts. Read the…
Cybercriminals buy up admin credentials to sharpen attacks on cloud deployments
This article has been indexed from Security on TechRepublic Lacework analysis finds that SSH, SQL, Docker and Redis were the most common targets over the last three months. Read the original article: Cybercriminals buy up admin credentials to sharpen attacks…
Cybercriminals are holding schools ransom for billions and some are paying up
This article has been indexed from Security on TechRepublic A new report highlights the financial costs of school ransomware, days lost to downtime and the number of students impacted, as these incidents become a steady source of criminal income. Read…
Paying ransom should be your last resort, cybersecurity expert says
This article has been indexed from Security on TechRepublic Some organizations can get by without paying in a ransomware attack, but others really have no choice, he says. Read the original article: Paying ransom should be your last resort, cybersecurity…
Expert: Governments and businesses must come together to combat ransomware threat
This article has been indexed from Security on TechRepublic Nations have to stop sheltering bad actors in order to stop them, expert says. Read the original article: Expert: Governments and businesses must come together to combat ransomware threat
Microsoft 365’s new security model: How to use phishing simulations and security mailboxes
This article has been indexed from Security on TechRepublic Microsoft 365’s “secure by default” stance removes some tools used by security teams. Here’s how to work around the new restrictions. Read the original article: Microsoft 365’s new security model: How…
How to use phishing simulations and security mailboxes with Microsoft 365’s new security model
This article has been indexed from Security on TechRepublic Microsoft 365’s “secure by default” stance removes some tools used by security teams. Here’s how to work around the new restrictions. Read the original article: How to use phishing simulations and…
Security alert: The threat is coming from inside your Docker container images
This article has been indexed from Security on TechRepublic Five malicious Docker container images were recently detected on Docker Hub, totaling more than 120,000 pulls. Read the original article: Security alert: The threat is coming from inside your Docker container…
How malicious Android apps use social engineering tactics to access Facebook accounts
This article has been indexed from Security on TechRepublic Learn how Android users can protect themselves against such malicious apps. Read the original article: How malicious Android apps use social engineering tactics to access Facebook accounts
Ransomware demands and payments skyrocket
This article has been indexed from Security on TechRepublic According to a ransomware report, the average ransom payment in the first half of 2021 jumped to $570,000. Learn more in TechRepublic’s Karen Roby interview with writer Lance Whitney. Read the…
Top 10 tech and health jobs with the best pay and growth potential
This article has been indexed from Security on TechRepublic A new analysis shows that infosec analysts, sysadmins and network architects will see the most growth over the next decade. Read the original article: Top 10 tech and health jobs with…
“Intruders” in the cloud: Microsoft warns “thousands” of Azure customers about potential exposure
This article has been indexed from Security on TechRepublic On Thursday, the company sent warnings to “thousands” of its cloud computing customers, explaining that “intruders” could have access to Microsoft Azure’s Cosmos DB databases, according to Reuters. Read the original…
“Intruders” in the cloud: Microsoft warns “thousands” of customers about potential exposure
This article has been indexed from Security on TechRepublic On Thursday, the company sent warnings to “thousands” of its cloud computing customers, explaining that “intruders” could have access to their databases, according to Reuters. Read the original article: “Intruders” in…
How to create locally signed SSL certificates with mkcert
This article has been indexed from Security on TechRepublic If you need to generate quick SSL certificates for test servers and services, mkcert might be the fastest option available. Jack Wallen shows you how to use this handy tool. Read…
Google and mobile operating systems top list of privacy concerns, says Kaspersky
This article has been indexed from Security on TechRepublic Using data gathered by its Privacy Checker website, Kaspersky has been able to pinpoint areas of concern for visitors seeking to improve their privacy posture. Read the original article: Google and…
Tech companies pledge to help toughen US cybersecurity in White House meeting
This article has been indexed from Security on TechRepublic Apple, Google, Microsoft and others will fund new technologies and training as part of the nation’s struggle to combat cyberattacks. Read the original article: Tech companies pledge to help toughen US…
Want to become a white-hat hacker? Here’s what you need to know
This article has been indexed from Security on TechRepublic Switch to an exciting new tech career as a white-hat hacker. For this training course, you can study on your own time without going into debt. Read the original article: Want…
Kanye’s upcoming album is a scam magnet, Kaspersky finds
This article has been indexed from Security on TechRepublic “Donda” will be out Aug. 26, and scammers are taking advantage of fan anticipation by seeding the internet with malicious fake downloads. Read the original article: Kanye’s upcoming album is a…
How safe is a quantum-safe virtual private network?
This article has been indexed from Security on TechRepublic Verizon aims to find out by testing the technology, which is geared at enhancing encryption methods using session key exchange security mechanisms, the carrier said. Read the original article: How safe…
You can remove or update a single entry from the SSH known_hosts file
This article has been indexed from Security on TechRepublic Sometimes you might need to remove or update an SSH fingerprint of your remote machines in the known_hosts file. Jack Wallen shows you how. Read the original article: You can remove…
Don’t get rugged: DeFi scams go from zero to $129 million in a year to become top financial hack
This article has been indexed from Security on TechRepublic Atlas VPN’s analysis finds that theft within decentralized finance networks is taking in more money than phishing and ransomware attacks. Read the original article: Don’t get rugged: DeFi scams go from…
Survey: Boards want to invest more in technology, data analytics
This article has been indexed from Security on TechRepublic Risk officers would rather stay in their compliance roles than add data usage to their duties, EY survey says. Read the original article: Survey: Boards want to invest more in technology,…
Risk officers and board members don’t agree on use of tech and data in business
This article has been indexed from Security on TechRepublic Survey by EY finds that board members are interested in spending more money on technology and data analytics for risk management. Read the original article: Risk officers and board members don’t…
Microsoft Power Apps misconfiguration exposes data from 38 million records
This article has been indexed from Security on TechRepublic The leaked data included personal information for COVID-19 contact tracing and vaccination appointments, social security numbers for job applicants, employee IDs, names and email addresses. Read the original article: Microsoft Power…
Trend Micro’s Linux Threat Report identifies the most vulnerable distributions and biggest security headaches
This article has been indexed from Security on TechRepublic Analysts reviewed 13 million security incidents and found that end-of-life versions of Linux distributions were at the biggest risk. Read the original article: Trend Micro’s Linux Threat Report identifies the most…
How to create a hidden, nearly undeletable folder in Windows 10
This article has been indexed from Security on TechRepublic It is possible to hide sensitive folders and files from prying eyes in File Explorer using a few attribute settings. We show you how to hide folders and prevent their accidental…
Photos: Windows 365 Business in action
This article has been indexed from Security on TechRepublic We took Microsoft’s cloud PC platform for a spin. Here’s what we found. Read the original article: Photos: Windows 365 Business in action
Windows 365 Business: How this new tool can help your organization
This article has been indexed from Security on TechRepublic Simon Bisson tried out the new Microsoft 365 tool, which allows you to create virtual machines for your staff working from home. Here’s what he learned. Read the original article: Windows…
Great Resignation hits IT departments and companies are switching strategies
This article has been indexed from Security on TechRepublic To ensure business continuity amid high turnover, many CIOs are planning to alter their strategies to make the company “less dependent on employee institutional knowledge,” says PwC. Read the original article:…
It’s time to retire the Social Security number
This article has been indexed from Security on TechRepublic With 40 million people having their SSN exposed during the T-Mobile hack, it’s time to reconsider the usefulness of the Social Security number. Read the original article: It’s time to retire…
How to protect your T-Mobile account in light of the latest data breach
This article has been indexed from Security on TechRepublic In response to a breach that compromised the personal data of millions of subscribers, T-Mobile customers should change their password and PIN and set up two-step verification. Read the original article:…
Why it’s important to create a common language of cyber risk
This article has been indexed from Security on TechRepublic All departments of an organization need to be on the same page where cybersecurity is concerned, and that will only happen if the terminology used is understood by all. Read the…
T-Mobile breach exposed personal data of almost 50 million people
This article has been indexed from Security on TechRepublic Attackers captured the names, dates of birth, Social Security numbers and driver’s license numbers of millions of current, former and potential T-Mobile customers. Read the original article: T-Mobile breach exposed personal…
How to configure SSH access through Webmin
This article has been indexed from Security on TechRepublic Looking for an easier way to configure SSH on your data center servers? How about Webmin? Jack Wallen walks you through some of the options for better SSH security using this…
83 million devices using the Kalay protocol are at risk for remote takeover. Are yours?
This article has been indexed from Security on TechRepublic ThroughTek’s Kalay is used to manage security cameras, baby monitors, DVRs and more. A newly discovered flaw lets attackers watch, listen and steal recordings from hardware sold by dozens of vendors.…
Knockoff semiconductor chips flood the enterprise market
This article has been indexed from Security on TechRepublic As the predominantly pandemic-caused global chip shortage rolls on, businesses are now facing another challenge — component scams and bogus supply-chain claims. Read the original article: Knockoff semiconductor chips flood the…
Expert: Cyberattacks in the energy sector put lives in danger
This article has been indexed from Security on TechRepublic Zero-trust is a good way to prevent hackers from gaining control of our infrastructure and energy industries, expert says. Read the original article: Expert: Cyberattacks in the energy sector put lives…
Zero-trust security is a great preventer of cyberattacks, expert says
This article has been indexed from Security on TechRepublic The zero-trust model prevents attacks, but also greatly limits the impact of a successful breach, such as a ransomware attack. Read the original article: Zero-trust security is a great preventer of…
ICS vulnerability reports are increasing in number and severity, and exploit complexity is dropping
This article has been indexed from Security on TechRepublic 71% of vulnerabilities found in the first half of 2021 are classified as high or critical, and 90% are of low complexity, meaning an attacker can expect repeated success under a…
Hackers are getting better at their jobs, but people are getting better at prevention
This article has been indexed from Security on TechRepublic Expert says people are becoming smarter about the links they click on and noticing the ones they shouldn’t, giving hope for the future of cybersecurity. Read the original article: Hackers are…
Cybercriminals are getting more sophisticated and better at going unnoticed
This article has been indexed from Security on TechRepublic Human error is still responsible for the majority of breaches, but we’re getting better about watching for suspicious links, expert says. Read the original article: Cybercriminals are getting more sophisticated and…
The top 3 cryptocurrency scams of 2021
This article has been indexed from Security on TechRepublic Kaspersky says that fake exchanges, fake mining hardware and wallet phishing are the most popular crypto scams of the year, many of which it said have a higher-than-usual level of detail.…
Education and research sector hit by highest number of cyberattacks in July
This article has been indexed from Security on TechRepublic Facilities in the sector saw an average of 1,739 attacks per organization each week last month, according to Check Point Research. Read the original article: Education and research sector hit by…
15 highest-paying certifications for 2021
This article has been indexed from Security on TechRepublic The top certification on the annual Skillsoft list has a salary of more than $171,000. Find out what certifications you should be working toward. Read the original article: 15 highest-paying certifications…
The 15 highest-paying certifications for 2021
This article has been indexed from Security on TechRepublic The top certification on the annual Skillsoft list has a salary of more than $171,000. Find out what certifications you should be working toward. Read the original article: The 15 highest-paying…
Lawyer discusses the evolving data privacy laws for businesses
This article has been indexed from Security on TechRepublic Every size company should know the laws regarding data privacy to avoid legal issues. Here’s why it’s important. Read the original article: Lawyer discusses the evolving data privacy laws for businesses
Data privacy laws are constantly changing: Make sure your business is up to date
This article has been indexed from Security on TechRepublic Lawyer who specializes in data privacy discusses the importance of knowing the law no matter what size business you operate. Read the original article: Data privacy laws are constantly changing: Make…
Data privacy is a growing concern for more consumers
This article has been indexed from Security on TechRepublic People surveyed by KPMG reported feeling increasingly uneasy about the data collection practices of corporations. Read the original article: Data privacy is a growing concern for more consumers
Top 5 tech annoyances
This article has been indexed from Security on TechRepublic Tom Merritt tells us his top five annoyances in tech and why they are frustrating. Read the original article: Top 5 tech annoyances
The 5 most annoying things in technology
This article has been indexed from Security on TechRepublic These five things are driving us crazy, says Tom Merritt. There’s hope for some to get better. Read the original article: The 5 most annoying things in technology
The cybersecurity skills gap persists for the fifth year running
This article has been indexed from Security on TechRepublic Most organizations are still lacking talent, according to a new report, but experts think expanding the definition of a cybersecurity professional can help. Read the original article: The cybersecurity skills gap…
Schools could be ripe for cyberattacks amid ransomware open season
This article has been indexed from Security on TechRepublic In recent months, a string of high-profile cyberattacks have targeted critical U.S. infrastructure. As students return to the classroom, could criminals look to focus their efforts on schools? Read the original…
Windows 10: How to activate Microsoft Defender Application Guard
This article has been indexed from Security on TechRepublic Microsoft Defender Application Guard protects your networks and data from malicious applications running in your web browser. Learn how to install and activate this Windows 10 security feature. Read the original…
Behind the scenes: A day in the life of a CIO
This article has been indexed from Security on TechRepublic Getting to the point where you’re proactive is “utopia,” says Jadee Hanson, CIO at Code42. Read the original article: Behind the scenes: A day in the life of a CIO
What is zero trust security?
This article has been indexed from Security on TechRepublic Want a zero-trust security primer on this complex cybersecurity topic? Brandon Vigliarolo breaks it down for you. Read the original article: What is zero trust security?
Company size is a nonissue with automated cyberattack tools
This article has been indexed from Security on TechRepublic Even with plenty of old problems to contend with, an expert suggests security pros need to get ready for new and more powerful automated ransomware tools. Read the original article: Company…
Excel is still a security headache after 30 years because of this one feature
This article has been indexed from Security on TechRepublic Threat researcher explains why it’s tricky to tell the difference between legitimate Excel Macros and ones that deliver malware. Read the original article: Excel is still a security headache after 30…
A diverse cybersecurity team can help alleviate the talent shortage
This article has been indexed from Security on TechRepublic Responsibilities are complex and require different job descriptions, reduced bias and a variety of skill sets, industry leaders say. Read the original article: A diverse cybersecurity team can help alleviate the…
How to install Webmin on Rocky Linux
This article has been indexed from Security on TechRepublic With Webmin, you can better secure and manage your instances of Rocky Linux. Jack Wallen walks you through the process of getting this web-based tool up and running. Read the original…
For sale: Access to your company network. Price: Less than you’d think
This article has been indexed from Security on TechRepublic Access to secured networks is regularly sold on the Dark Web and 45% of those sales are less than $1,000. Read the original article: For sale: Access to your company network.…
When 2FA on your Linux servers won’t let you in, try this fix
This article has been indexed from Security on TechRepublic When your Linux servers are giving you fits, Jack Wallen has the solution for you. Read the original article: When 2FA on your Linux servers won’t let you in, try this…
Microsoft fixes Print Spooler bugs with August Patch Tuesday rollout
This article has been indexed from Security on TechRepublic The fix, though, means that only administrators will be able to install print drivers on Windows PCs. Read the original article: Microsoft fixes Print Spooler bugs with August Patch Tuesday rollout
Top 5 ransomware operators by income
This article has been indexed from Security on TechRepublic Tom Merritt lists the most lucrative ransomware gangs and why they’re dangerous. Read the original article: Top 5 ransomware operators by income
Ransomware operators by income: Top 5
This article has been indexed from Security on TechRepublic Ransomware gangs continue because they make a lot of money. Tom Merritt talks about the five most lucrative ones. Read the original article: Ransomware operators by income: Top 5
Fake COVID vaccine card sales ramp up on Dark Web
This article has been indexed from Security on TechRepublic Even as the delta variant spreads, many people would rather pay money for a phony vaccine card than get the actual shot for free, according to Check Point Research. Read the…
Use 2FA to secure your WordPress login
This article has been indexed from Security on TechRepublic Jack Wallen shows you how to keep your WordPress account safe with two-factor authentication. Read the original article: Use 2FA to secure your WordPress login
Chinese threat actors have been compromising telecom networks for years, investigation finds
This article has been indexed from Security on TechRepublic Hackers linked to the Chinese government invaded major telecom companies “across Southeast Asia,” says reporting firm Cybereason, and the tools they used will sound familiar. Read the original article: Chinese threat…
How to reduce your organization’s security risk in 6 steps
This article has been indexed from Security on TechRepublic It’s impossible to guarantee security—but nearly all organizations should take these actions to protect organizational data and systems. Read the original article: How to reduce your organization’s security risk in 6…
How to get the Windows 11 security protections on your Windows 10 PC
This article has been indexed from Security on TechRepublic Windows 11 will turn on hardware security by default but only on new PCs or if you re-image from scratch. But there is a workaround. Read the original article: How to…
You can use wget behind a proxy: Here’s how
This article has been indexed from Security on TechRepublic Jack Wallen has the solution to get this setup working properly. If wget is your go-to download command on your Linux servers, and your machines are behind a proxy, learn this…
Ransomware demands and payments reach new highs
This article has been indexed from Security on TechRepublic As cybercriminals have become more aggressive, the average ransom payment in the first half of 2021 jumped to $570,000, up 82% from 2020, says Palo Alto Networks’ Unit 42. Read the…
Malicious Android apps try to hijack your Facebook account
This article has been indexed from Security on TechRepublic These apps attempt to capture such Facebook data as your ID, location, IP address and associated cookies, says Zimperium. Read the original article: Malicious Android apps try to hijack your Facebook…
How to pick a high-security video conferencing platform
This article has been indexed from Security on TechRepublic Several solutions meet HIPAA and GDPR requirements and complete SOC 2 audits. Read the original article: How to pick a high-security video conferencing platform
Behind the scenes: A day in the life of a cybersecurity “threat hunter”
This article has been indexed from Security on TechRepublic Here’s how one security operations analyst, an expert at incident reporting, began her career, collaborates with her colleagues and prioritizes incoming threats. Read the original article: Behind the scenes: A day…
Phishing continues to target big businesses and exploit COVID-19 fears in Q2 2021
This article has been indexed from Security on TechRepublic Spam as a share of global mail traffic rose, and attackers have started to adapt their scams to other languages to reach wider audiences. Read the original article: Phishing continues to…
Amazon Kindle flaws could have allowed attackers to control the device
This article has been indexed from Security on TechRepublic Now patched by Amazon, security vulnerabilities found by Check Point would have given attackers access to a Kindle device and its stored data. Read the original article: Amazon Kindle flaws could…
FTC warns of phishing scams over unemployment benefits
This article has been indexed from Security on TechRepublic The scam messages try to convince you to enter your Social Security number and other personal info at a website masquerading as your state’s workforce agency. Read the original article: FTC…
The most secure browser for transmitting sensitive data is definitely not Chrome
This article has been indexed from Security on TechRepublic Jack Wallen addresses the challenging question of which browser is best to use for transmitting encrypted data. Read the original article: The most secure browser for transmitting sensitive data is definitely…
Where to find the best-paying cybersecurity jobs
This article has been indexed from Security on TechRepublic New analysis includes salary data, cost of living and how easy it is to find a job and identifies cities with the best pay and the most open positions. Read the…
Cybersecurity pros wanted: Tips for hiring IT and security talent right now
This article has been indexed from Security on TechRepublic Companies are pulling out all of the stops to attract top talent in a tight labor market. These tips could help companies attract and retain cybersecurity pros in the months ahead.…
Global cyber intrusion activity jumped 125% in the first half of 2021
This article has been indexed from Security on TechRepublic Companies in the U.S. were targeted more than those in any other country, according to Accenture’s Cyber Incident Response Update. Read the original article: Global cyber intrusion activity jumped 125% in…
True cybersecurity means centering policies on employee behavior, report says
This article has been indexed from Security on TechRepublic Protecting systems from bad actors is essential, but all the firewalls in the world are useless against the modern hacker who targets human weaknesses instead of digital ones. Read the original…
5 factors for success in cybersecurity projects among shifting priorities
This article has been indexed from Security on TechRepublic As more companies are considering the shift to a fully or hybrid remote workforce, accelerating plans to acquire digital and cloud services to address increasing cybersecurity risks is necessary. Read the…