Top

Category: Access control


Access control, Hacker, Network security, Security, Threats & Malware

Massive DDos attack hit Telegram, company says most of junk traffic is from China

June 13, 2019

Via: Security Affairs

Telegram was used by protesters in Hong Kong to evade surveillance and coordinate their demonstrations against China that would allow extraditions from the country to the mainland. The country is facing the worst political crisis ùsince its 1997 handover from […]


Access control, Security

Security overconfidence and immaturity continue to endanger organizations

May 30, 2019

Via: Help Net Security

The majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. Seventy-nine percent of organizations do not have a mature approach to Privileged Access Management (PAM), yet 93% believe […]


Access control, Cloud security, Security

Goodbye Passwords: Hello Identity Management

May 24, 2019

Via: Threat Post

Keeping track of user names and passwords sounds easy, but it is not. In a world where protected network resources are accessed by employees on mobile devices, outside contractors, web applications and internet of things (IoT) devices – passwords just […]


Access control, Network security, Security

G Suite users’ passwords stored in plain-text for more than 14 years

May 22, 2019

Via: Security Affairs

The news is disconcerting, Google has accidentally stored the passwords of the G Suite users in plain-text for 14 years, this means that every employee in the company was able to access them. According to the tech giant, the incident […]


Access control, Network security, Security

Employers should develop cybersecurity protocols and invest more in employee training programs

April 25, 2019

Via: Help Net Security

Organizations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The ObserveIT global survey of 600 IT leaders across various industries found that employers should develop clear cybersecurity protocols […]


Access control, Application security, Cyber-crime, Identity theft, Network security, Security

A casual approach to workplace communications presents major security risks

April 24, 2019

Via: Help Net Security

Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and […]


Access control, Identity theft, Security

Banks continue to prioritize risk management over customer convenience

April 17, 2019

Via: Help Net Security

Almost three in four banks in Asia Pacific anticipate that fraud in their country will increase in 2019, according to a recent poll by FICO. Of specific concern are transactions completed when neither the card nor the cardholder is physically […]


Access control

85% of organizations fail to meet even basic PAM security hygiene

April 5, 2019

Via: Help Net Security

While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access management (PAM) security practices are woefully lacking and even worse than you might expect. Eighty-five percent are […]


Access control, Cloud security

Most IT and security professionals feel vulnerable to insider threats

March 21, 2019

Via: Help Net Security

91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more. “The rise […]


Access control, Network security

Citrix Breach Underscores Password Perils

March 13, 2019

Via: Dark Reading

The recent cyberattack on enterprise technology provider Citrix Systems using a technique known as password spraying highlights a major problem that passwords pose for companies: Users who select weak passwords or reuse their login credentials on different sites expose their […]