Online privacy is a hot-button issue in 2018. How have recent privacy scandals and online policy changes affected the way Americans view safety online? TheBestVPN surveyed 1,000 Americans to find out.
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
Blockchain has been making plenty of headlines this year and is beginning to disrupt how business is conducted. Accordingly, it’s also placing additional demands on accounting and finance functions. Cryptocurrency is the major source of these changes which, according to 50% of financial leaders in a Robert Half Finance & Accounting survey, will become at […]
Colorado’s updated data privacy law will take effect on September 1, meaning employers face more stringent obligations related to disposal and security of residents’ personal identifying information (PII).
Cybersecurity continues to top the list of leading threats for 2018 among businesses and organizations of all shapes and sizes. More and more companies are begging for cybersecurity talent to protect their organization and customers against cyberattacks.
Healthcare facilities all over the world tend to be reliable soft targets for cybercriminals. This is often due to the industry’s reliance on outdated or improperly patched hardware and software, making it easier for threat actors to find their way into the network. The fallout from a successful attack is also potentially devastating, given the […]
Despite the overall increase in companies offering bug bounty rewards to those who find and report vulnerabilities, ethical security research can still be a bit of a legal minefield. For example, back in May 2018 it fell to Governor Nathan Deal of Georgia to veto a bill that would have made even it difficult to […]
This seems to be a busy week for some interesting attempts at social engineering through snail mail. Reports from earlier this week outlined the random campaign by (apparently) Chinese cybercriminals sending out malware-laden compact discs to state and local government agencies. On Wednesday, Kent German presented his tale of being extorted for bitcoin via letter […]
More manufacturers than ever before are turning to automation, whether to combat rising production costs or increase productivity. Modern automation systems operate on Operational Technology (OT) networks, comprised of industrial control (ICS) and supervisory control and data acquisitions systems (SCADA). These systems are designed to operate in conjunction with each other and are quite sensitive […]
Sometimes when you’re working in a high-tech space, a low-tech solution might be just what you need to solve a problem. Apparently, the same goes for cybercriminals. For example, some of the most effective social engineering attacks start with a phone call. This one reported by Brian Krebs is a bit of a head-scratcher, though.
In the business world, it’s common to hear of discussions taking place at the “C-Suite Level,” which usually includes the chief executive officer (CEO), chief financial officer (CFO), the chief operating officer (COO), and the chief information officer (CIO). More cyber professionals are taking on roles at this level as well, as chief technology officers […]