cybersecurity

Password psychology: People aren’t protecting themselves even though they know better
People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. Password psychology Year …

Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching
Directly after the WHO declared COVID-19 a global pandemic, an estimated 16 million US employees were sent home and instructed to work remotely, while governments around the …

How to prevent permission bloat: Overlooked and hidden access
When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization …

Why you should be rushing to deploy multi-factor authentication to support remote work
With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

Half of IT pros believe their cybersecurity teams are ready to detect attacks
A surprising 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to rising cybersecurity …

Help your helpdesk: Empower employees to self-reset their AD account password
The COVID-19 pandemic has triggered a momentous shift for many organizations: remote work has become the new normal. Businesses that were skeptical before are now being forced …

Protecting corporate data in popular cloud-based collaborative apps
Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …

Consumers will opt for competitors after a single ransomware-related service disruption
While most consumers are taking necessary security precautions to protect their online accounts, businesses may not be doing enough to protect their information – …

Despite spending more on compliance, businesses still have basic IT weaknesses
There is a misalignment between data privacy regulation spending and business outcomes, according to Tanium research. Specifically, as businesses spend tens of millions on …

Growth of APIs for new services
This is the second of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …

Mitigating cybersecurity risks for employees working remotely
Many IT specialists are supporting fully remote teams for the first time ever, so it’s important for everyone to operate with the same caution (if not more) than they would if …

Surge in phishing attacks using legitimate reCAPTCHA walls
Cyber scammers are starting to use legitimate reCAPTCHA walls to disguise malicious content from email security systems, Barracuda Networks has observed. The reCAPTCHA walls …