July 6, 2016
Via: Russel HowardsAny network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The […]
June 24, 2016
Via: Help Net SecurityBy 2020, a corporate “no-cloud” policy will be as rare as a “no-Internet” policy is today, according to Gartner. Cloud-first, and even cloud-only, is replacing the defensive no-cloud stance that dominated many large providers in recent years. Today, most provider […]
May 16, 2016
Via: Security WeekSecurity is now a topic on many board meeting agendas. Board members need to understand what threats they face, if they are prepared to stop them, and what additional security investments they need to make to better protect themselves from […]
April 18, 2016
Via: CSO OnlineThe Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products. In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS […]
March 30, 2016
Via: TrendMicro BlogAs the SMB marketplace evolves and becomes more competitive, businesses are looking for ways to reduce costs, improve worker productivity, and create new, sustainable business models that not only protect their existing customer base from being encroached on by competitors […]
Access control, Privacy protection
January 21, 2016
Via: Help Net SecurityPrivate, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of their customer data seriously, employees are not protected to the same level, according to a new Sophos […]
January 11, 2016
Via: Help Net SecurityWireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go. As a small to mid-sized business (SMB), you may be considering or already offering Wi-Fi as a […]
December 2, 2015
Via: Help Net SecurityWhen it comes to migrating to the cloud, 65% of companies are concerned with security and 40% worry about their loss of physical control over data in the cloud. In particular, 69% of companies are afraid that migration to the […]
September 20, 2015
Via: data-lossA few months ago on this blog we raised the basic points that you should think about when confronted with a cyber-attack. Unfortunately the general reaction of some companies is very different to this – here we present to you […]
September 18, 2015
Via: hackerWhen #businesses are hit by noticeable distributed denial-of-service #attacks, three-quarters of the time those attacks are accompanied by another security incident, according to #kaspersky Lab. Those other attacks may or may not originate from the same party, but they can […]
September 8, 2015
Via: hackerThe more things change, the more things stay the same — at least for hackers. That’s one of the finding in #proofpoint‘s mid-year threat report on the #attacks of choice for the first half of #2015. In addition to the […]
July 19, 2015
Via: phishingYears after they were first used to catch out unwary users, simple phishing scams sent via email are both common and effective. On the face of it this is surprising. Businesses installed email-filtering gateways a decade ago, some even investing […]
June 15, 2015
Via: privacy-protectionMore than 90% of Europeans are concerned about mobile apps collecting their data without their consent. Today, an important step was taken to finalize EU data protection rules to help restore that confidence. Ministers in the Council reached a General […]
April 18, 2024
April 22, 2024