:)
Keeping things separate: why you need a personal laptop
May12

Keeping things separate: why you need a personal laptop

Keeping things separate: why you need a personal laptop https://www.computerworld.com In the era of hacking and online security breaches, it might be wise to keep your private life and work separately. If one succumbs to any of the various cyber threats, it won’t endanger the other. In other words, you should avoid keeping your private life and work on the same device. Multiple devices, fewer problems The device you use to store...

Read More
Automation and Integration is Essential to Effective Cybersecurity
Apr04

Automation and Integration is Essential to Effective Cybersecurity

Automation and Integration is Essential to Effective Cybersecurity Source – bbc.com We live in a world where both customers and employees expect instant and remote access to data and software functionality wherever they are. This convenience has opened the door to entirely new products, services, and work models. However, ensuring the same door isn’t left ajar for cybercriminals is a growing problem. Bad actors are continuously...

Read More
What is Privileged Access Management?
Dec28

What is Privileged Access Management?

What is Privileged Access Management? Source – www.cnn.com We’re approaching a new year, and it looks like, yet again, the pandemic will be affecting how we do business. The omicron variant likely means that many companies will let their employees continue to work remotely. There is also likely to be plenty of uncertainty along the way. What you do have control over as a business operating in an uncertain world is how you...

Read More
Hackers Target New Windows Installer Flaw
Nov28

Hackers Target New Windows Installer Flaw

The flaw can allow attackers to have admin rights.  Microsoft Windows Installer Exploit  Bad actors have already created malware that could exploit the privilege vulnerability found in Microsoft Windows Installer. The company has released a patch with an important rating and a severity score of 5.5 out of 10.  At the time the flaw was discovered, it wasn’t actively exploited. But it is now. The bug could still be exploited...

Read More
Crypto Miners are Hacking Cloud Accounts — Google Warns
Nov27

Crypto Miners are Hacking Cloud Accounts — Google Warns

Cloud computing platforms can be used for crypto mining.  Cyber Criminals are Hacking Cloud Accounts to Mine Cryptocurrency  Google published its initial threat horizon report. One of the things that it underlined was the hacking of Google could account by cybercriminals to mine cryptocurrency.  The report stated that the cybersecurity team observed malicious actors performing cryptocurrency mining in compromised Cloud instances....

Read More
Ryuk Hack Highlights the Need for Better Secure Remote Access
Jun08

Ryuk Hack Highlights the Need for Better Secure Remote Access

Ryuk Hack Highlights the Need for Better Secure Remote Access Source – forbes.com Recently, a research institute lost a week’s work of valuable research data on COVID-19 due to a security incident. One of the main enablers of the attack was poor remote access security. This incident may have been averted if a solution like the cloud-based remote access VPN built into secure access service edge (SASE) were in place instead....

Read More