The biggest security risks to your business often come from within your own office. This doesn’t mean your employees are criminals; in fact, the problem usually starts because your staff is hardworking and helpful.
Read MoreDoes your leadership team follow the same security rules as everyone else, or are there special exceptions made for the executive suite? One of the most dangerous vulnerabilities in a business is the CEO who’s too busy to adhere to the multi-factor authentication policy or who insists on having administrative access to every file in the company. This is precisely why cybercriminals target high-level executives; the likelihood that they have access to data they shouldn’t is much higher than the average employee.
Read MoreTowards the end of February of this year, LexisNexis Legal & Professional fell victim to a data breach in which the responsible party accessed the data analytics company’s Amazon Web Services infrastructure due to an unpatched application. While the data leak itself was (according to LexisNexis L&P, at least) relatively minimal, this breach presents an opportunity to reiterate the importance of an easy-to-overlook vulnerability that quietly causes problems for businesses of all sizes.
Read MoreThere’s no denying the convenience that so many of technology's essential features and functions can now be managed with a simple command, if not completely automated, thanks to the Internet of Things. With the IoT, everything is augmented by a miniature computer… but these devices are built to be convenient and (for lack of a better term) cheap.
Read MoreAre you still depending on your business being so small that it flies “under the radar” of potential threats? The most dangerous mindset you can have is that you’re too small for a hacker to care about your data. In reality, hackers don’t care how big your business is; they care about what data they can steal, and there’s plenty of it on your infrastructure.
Read MoreIf you’re counting on a big, dramatic hacking attack being the method of choice for any cybercriminal with you in their sights, I have some bad news.
Read MoreThe walls of Troy didn't crumble under brute force; they opened from the inside. By the time the Trojans realized their gift was a hollow shell filled with Greek soldiers, the decade-long siege was over in hours.
Read MoreYou know your business needs multi-factor authentication, but chances are you see a lot of pushback from your employees because of how inconvenient it is for their work. In an effort to please everyone, you implement SMS authentication out of sheer convenience, but the innovation of SIM swapping means that this method of MFA is a vulnerability rather than a security solution. A hacker doesn’t need to steal your phone; they just need to trick a customer service representative at your mobile carrier to port your phone number to a new SIM card they control. If your second factor can be stolen so easily, what’s your business supposed to do?
Read MoreDid you know the oldest known lock ever discovered is thought to be 4,000 years old? Discovered in the Khorsabad palace ruins in modern-day Iraq, it used wooden pegs to keep a large wooden bolt secure. For millennia, we've understood the need to protect what's valuable.
Read MoreIt’s known that baby toys can aid in all manner of developmental processes, so take a moment to imagine what the future of technology holds for toys. Will they continue in the same vein as toys that teach color recognition, teamwork, sharing, and creativity, or will they get even more wild and out of the box? Regardless, one thing is for certain: security challenges exist just on the horizon and will have to be addressed if parents want to keep their children safe.
Read More