dcsimg

Data Security : May 2017 Archives

Securing your data and network, inside and outside the perimeter

Ensuring IT and Legal Are on the Same Page

31 May, 2017

The security team is supposed to make sure the network and the data accessed through that network is safe. The legal team is charged with protecting the overall business. ...More >

Don’t Fear the Breach; Do Fear the Misinformation

30 May, 2017

Security isn’t just about endpoint protection and data breaches. We are working and living in a world without true boundaries and where misinformation meant to cause damage is spreading as quickly as real information. ...More >

New Studies Renew Concerns of Insider Risks

25 May, 2017

It’s easy to get caught up with all of the other types of threats, but cybersecurity has to start at home, and that begins with better monitoring of the folks who have direct access to your network and data. ...More >

Security Professionals React to Cybersecurity Executive Order

22 May, 2017

Our cybersecurity problems didn’t evolve overnight, nor will they be fixed with one EO. Time will tell how effective this is and how the administration builds on what it has begun. ...More >

Lessons of WannaCry: Back Up Your Data and Update Your Software

18 May, 2017

Now that the initial shock and awe reaction to WannaCry has subsided a bit, we can look at the ransomware a little more rationally and see what we can learn from it. ...More >

Thanks to WannaCry Ransomware, A Dark Day for Cybersecurity

15 May, 2017

WannaCry used an exploit named EternalBlue, which Microsoft patched back in March. Many organizations had not bothered to install the patch. ...More >

Study Finds Serious Security Concerns with Robots

12 May, 2017

Human behavior has a role to play in robot security. But robotic security is a very complicated issue. ...More >

Google Docs Phishing Scam Takes Advantage of Human Behavior

08 May, 2017

In the Google Docs phish, the hackers not only turned to behavior to gain an edge, they also used the legitimate functionality within Google's infrastructure to provide a proper user login. ...More >

World Password Day Reminds Us to Examine Our Weakest Security Link

04 May, 2017

Good password management isn’t rocket science, but the truth is, we all get lazy about them. Sometimes we need a reminder. ...More >

Phishing Continues to Stand Out as a Primary Attack Vector in Verizon 2017 DBIR

01 May, 2017

Doesn’t it so often seem that cyberattacks come back to phishing and social engineering? ...More >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.