Data Encryption: 4 Common Pitfalls

To maximize encryption effectiveness you must minimize adverse effects in network performance and complexity. Here’s how. Employing data encryption is a no-brainer, as it supports the defense-in-depth strategy that organizations must embrace to stop bad actors from accessing sensitive network files. However, outside of the extra layers of protection data encryption can provide, there are also tradeoffs…

Breach-Proofing Your Data in a GDPR World

The massive data breaches that have hit the headlines in recent years, including Yahoo, Verizon, and particularly Equifax, have taken a toll on breach victims, consumers, and corporations. We’ve seen stocks drop precipitously, class-action lawsuits filed, CEOs shown the door, and executives called before Congress. This year, breaches could be even more costly for companies…

It’s 2018: Time to assess your cyberrisk

What springs to mind when you hear the phrase: “The future’s already here”? It evokes thoughts of new technologies that are poised to make life easier, better, and safer — not modern cyberthreats. But so-called next-generation threats are already here, too. On February 20, within the framework of the European Summit on Information Security (TEISS…

Insurers, Nonprofits Most Likely to Fall for Phishing: Study

The employees of insurance companies and non-profit organizations are most likely to fall for phishing attacks, according to a study conducted by security awareness training firm KnowBe4. KnowBe4’s study is based on data collected from six million users across 11,000 organizations. The company has tested users at three stages: before any awareness training, after 90…

IoT Devices Fuel Complex DDoS Attacks: Report

The continuous use of compromised Internet of Things (IoT) devices to launch distributed denial of service (DDoS) attacks has helped cybercriminals increase the complexity of their assaults, NETSCOUT’s Arbor Networks says. According to the company’s 13th Annual Worldwide Infrastructure Security Report (WISR), attackers focused on increasing complexity in 2017, and the exploitation of IoT devices…

5 Steps to Better Security in Hybrid Clouds

Following these tips can improve your security visibility and standardize management across hybrid environments. When it comes to embracing innovation, we are all a little cautious by nature. For example, we know electric cars are the future, but the infrastructure to fully support them isn’t ready yet. So sales of hybrid gas/electric cars are booming…

Man Admits to Directing DDoS Attacks Across the US

New Mexico man pleads guilty to directing cyberattacks against his prior employers, business competitors, and law enforcement agencies. John Kelsey Gammell has pleaded guilty to engaging in, and directing, distributed denial-of-service (DDoS) attacks against websites of former employers, business competitors, and public services including law enforcement and courts, the US Department of Justice reported this…

Game over? It’s up to your password

My fellow 90s gamers will remember LAN parties — the original connected gaming — and playing Counter-Strike and Half-Life in Internet cafés. For many, Counter-Strike was our introduction to multiplayer gaming. Then, in the early 2000s, a game called World of Warcraft changed everything. I had never seen so many people on the same server before! It was a new world,…

Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified

2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of attacks over the last two years. The good news is that record numbers of these attacks are thwarted by organizations investing in innovative, digital-first strategies to protect consumers facing downstream attacks…