Security

TrendMicro

Phishing, Part 1: On the Lookout

Cybersecurity has gone mainstream, thanks in part to the hacking of the 2016 Presidential election. But how many of us know how the attackers in this case actually achieved their ends? The truth is, that one of the oldest, but most effective weapons in the cybercriminal’s arsenal, undoubtedly used in those attacks, is a threat…
The post Phishing, Part 1: On the Lookout appeared first on . Read More HERE…

Read More
TrendMicro

Which specific malware trends should American businesses be prepared for?

In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and data. After all, with each new day comes a sophisticated…
The post Which specific malware trends should American businesses be prepared for? appeared first on . Read More HERE…

Read More
Networkworld

REVIEW: Best VPN routers for small business

When selecting VPN routers, small businesses want ones that support the VPN protocols they desire as well as ones that fit their budgets, are easy to use and have good documentation.We looked at five different models from five different vendors: Cisco, D-Link, and DrayTek, Mikrotik and ZyXEL. Our evaluation called for setting up each unit and weighing the relative merits of their price, features and user-friendliness.[ Learn who’s developing quantum computers.]
Below is a quick summary of the results:To read this article in full, please click here(Insider Story) READ MORE HERE…

Read More
TrendMicro

Zero-Day Coverage Update – Week of July 23, 2018

We’re at the end of July and the Zero Day Initiative (ZDI) has published 873 advisories so far. That’s 273 advisories this month alone – and that’s just the tip of the iceberg! Earlier this week, ZDI announced the Targeted Incentive Program, which brings over $1,500,000 USD in special bounty awards for specific targets. With…
The post Zero-Day Coverage Update – Week of July 23, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

Is chat putting your business at risk?

Now that corporate activities are increasingly taking place outside of the office, technology that enables real-time communication and collaboration among office workers and telecommuters is absolutely essential. Elements like file sharing, video conferencing and cloud access have quickly become imperative. However, few solutions address the challenges that can come up with geographically dispersed workers like…
The post Is chat putting your business at risk? appeared first on . Read More HERE…

Read More
TrendMicro

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physical component that is unusual in the…
The post Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence appeared first on . Read More HERE…

Read More
TrendMicro

Preparing for Shadow OT: A Hospital Case Study

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…
The post Preparing for Shadow OT: A Hospital Case Study appeared first on . Read More HERE…

Read More
TrendMicro

What financial service providers should know about blockchain: Opportunities and threats

It seems that every few years, an advanced and innovative new technology emerges and becomes the next big thing for organizations across different industries. Take the cloud and big data, for example – during their buzzword stage, these concepts were being attached to just about everything in the tech space. Currently, it appears that blockchain…
The post What financial service providers should know about blockchain: Opportunities and threats appeared first on . Read More HERE…

Read More
Networkworld

Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD

As consumer Internet of Things (IoT) devices inevitably find their way into the workplace, IT pros need to isolate them from the rest of the enterprise network, perhaps on a network of their own, so they don’t become backdoors exploitable by attackers, according to the head of the Online Trust Alliance.Jeff Wilbur, the director of the alliance, which is an initiative within the larger Internet Society, says that it is better to embrace employees’ IoT devices and allow them to be used safely than to ban them and risk their unauthorized, unprotected use that could undermine network security.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

The trend toward cryptojacking: What it is and how businesses can prevent it

Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the…
The post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on . Read More HERE…

Read More