HackDig : Dig high-quality web security articles

Educating the Educators: Protecting Student Data

I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His class had been canceled after his teacher fell for a phishing attack, and their computer was infected with a virus. This isn’t an isolated incident. Take a look at how
Publish At:2021-06-11 11:25 | Read:203 | Comments:0 | Tags:Data Protection Security Services Data Education Phishing At

School Cybersecurity: How Awareness Training Removes Attackers’ Options

Keeping student data safe and maintaining information security in education are part of living in today’s world for educators. Why is it important to include data security in their work? Find an example of how to set up a school cybersecurity policy and more below. School Cyberattacks On the Rise There’s no sign that digital attacks are slowing
Publish At:2021-06-02 12:47 | Read:332 | Comments:0 | Tags:Application Security Data Protection Security Services Cyber

Define, Reinforce and Track: Helping Develop Positive Cybersecurity Habits

Getting teams to improve security can be hard work, but it’s an important job that organisations must take seriously to protect an increasingly risky world. For this post, I wanted to explore some ways that an organisation or individual might start building a new security “habit” so that, in time, acting securely becomes automatic.Define itThe first key step
Publish At:2021-04-27 06:52 | Read:598 | Comments:0 | Tags:Security Awareness cybersecurity habit security cyber

6 Cybersecurity Tips for Working from Home

Here at Tripwire, we, like many others, recently surpassed the one-year anniversary of working from home due to the COVID-19 pandemic. Since March of 2020, we have converted kitchens, spare bedrooms and garages into office spaces. Our pets and children have become our coworkers, and companies are reporting a sudden increase in shirt sales as opposed to pant
Publish At:2021-04-20 00:15 | Read:483 | Comments:0 | Tags:Security Awareness Devices Remote working Security Advice Wo

Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors. As a result, it’s worth taking stock of current security systems and services to see what’s working, what isn’t and where operations can be improved. But how do businesse
Publish At:2021-04-01 07:10 | Read:509 | Comments:0 | Tags:Security Intelligence & Analytics Cloud Security Security Se

5 Cybersecurity Best Practices For Planning Ahead

Putting best practices in place is the most efficient way to combat cybersecurity threats. But that’s easier said than done, as there are a lot of forces working against our best efforts. The talent shortage looms the largest; there simply aren’t enough qualified cybersecurity experts out there to provide organizations a strong foundation. Witho
Publish At:2021-01-14 19:59 | Read:914 | Comments:0 | Tags:Security Services Cybersecurity Cybersecurity Training Incid

How Working From Home Has Changed Cybersecurity Awareness Training

Some of the most surprising news coming out of 2020 — a year when it seemed like there was a major breaking story every day — is the number of data breaches decreased during the first nine months of the year.  This is the exact opposite of what experts expected. The security concerns as millions of workers moved from on-site to a remote wor
Publish At:2021-01-08 11:53 | Read:676 | Comments:0 | Tags:Security Services Cybersecurity Training Security Awareness

5 Digital Threats to Watch Out for on Black Friday and Cyber Monday

Widely regarded as the official start to the Christmas shopping season, Black Friday and Cyber Monday are exciting because many retailers announce limited-time sales that promise huge savings to die-hard consumers. Not even the pandemic looks like it will dent consumers’ enthusiasm. In September 2020, for instance, Bloomberg shared research from Deloitte tha
Publish At:2020-11-24 07:32 | Read:1032 | Comments:0 | Tags:Security Awareness Black Friday malware Phishing scams cyber

Brand impersonation attacks targeting SMB organizations

IntroductionBuilding and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers and company. Brand trust and loyalty go hand-in-hand. Research has shown that 80% of US customers look at the trustworthiness of a brand when ma
Publish At:2020-10-21 12:23 | Read:876 | Comments:0 | Tags:Security Awareness

More Effective Security Awareness: 3 Tips for NCSAM

It’s often said that humans are the weakest link in cybersecurity. Indeed, I’d have a hard time arguing that a computer that was sealed in a box, untouched by human hand, poses much of a security risk. But a computer that is unused has no purpose. It behooves security practitioners to get smarter about how we teach people to use those machines so that both h
Publish At:2020-10-21 04:31 | Read:1411 | Comments:0 | Tags:Featured Articles Security Awareness cyber security culture

How to avoid getting locked out of your own account with multi-factor authentication

Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond the basic password security measures by forcing the user to authenticate with another method that (presumably) only th
Publish At:2020-10-19 09:41 | Read:932 | Comments:0 | Tags:Security Awareness

How to find weak passwords in your organization’s Active Directory

IntroductionConfidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There are several security controls designed specifically to enforce confidentiality requirements, but one of the oldest an
Publish At:2020-10-14 12:41 | Read:909 | Comments:0 | Tags:Security Awareness

How hackers use CAPTCHA to evade automated detection

IntroductionCAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA too. CAPTCHA was invented to help sites distinguish human users from bots and automated hacking tools. But little did
Publish At:2020-10-13 09:47 | Read:1212 | Comments:0 | Tags:Security Awareness hack

The State of Ransomware 2020: Key findings from Sophos & Malwarebytes

IntroductionRansomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specifically on enterprise entities, as many organizations found themselves in the crosshairs of malicious actors. These attacks are becoming increasingly complex, as cybercriminals leverage new and sophist
Publish At:2020-10-08 12:47 | Read:882 | Comments:0 | Tags:Security Awareness ransomware

Cybersecurity Awareness: 6 Myths And How To Combat Them

National Cybersecurity Awareness month is upon us. And, so is the opportunity to look at what common C-suite misconceptions could be handcuffing security awareness efforts.  As we enter the back half of 2020, now is the time to look at myths and highlight their relevancy in this chaotic year. Which myths are in the modern threat landscape? An
Publish At:2020-10-07 09:34 | Read:1302 | Comments:0 | Tags:CISO Incident Response Risk Management Cybersecurity cyberse

Tag Cloud