When it comes to data, resist your inner packrat

Credit to Author: Paul Gillin| Date: Fri, 22 Apr 2022 04:30:00 -0700

Human beings are natural pack rats, as evidenced by the 2.3 billion square feet of self-storage space that’s in use in the U.S. Fear of getting rid of stuff even has a name: disposophobia.

Keeping every pair of shoes your kids have ever worn isn’t a problem for anyone except those with whom you share living space.

But the same rules don’t apply to data.

All industries have records retention guidelines spelled out in compliance rules. They are usually strictly enforced for regulated companies, and firms that run afoul of them can be punished.

To read this article in full, please click here

Read more

In a remote-work world, a zero-trust revolution is necessary

Credit to Author: Mike Elgan| Date: Fri, 22 Apr 2022 03:00:00 -0700

Last summer, law enforcement officials contacted both Apple and Meta, demanding customer data in “emergency data requests.” The companies complied. Unfortunately, the “officials” turned out to be hackers affiliated with a cyber-gang called “Recursion Team.”

Roughly three years ago, the CEO of a UK-based energy company got a call from the CEO of the company’s German parent company instructing him to wire a quarter of a million dollars to a Hungarian “supplier.” He complied. Sadly, the German “CEO” was in fact a cybercriminal using deepfake audio technology to spoof the other man’s voice.

To read this article in full, please click here

Read more

12 Android settings that'll strengthen your security

Credit to Author: JR Raphael| Date: Fri, 22 Apr 2022 02:50:00 -0700

You might not know it from all the panic-inducing headlines out there, but Android is actually packed with practical and powerful security options. Some are activated by default and protecting you whether you realize it or not, while others are more out of the way but equally deserving of your attention.

So stop wasting your time worrying about the Android malware monster du jour and which security company is using it to scare you into an unnecessary subscription, and take a moment instead to look through these far more impactful Android settings — ranging from core system-level elements to some more advanced and easily overlooked options.

To read this article in full, please click here

Read more

Secure application development cloud best practices

Credit to Author: Tabitha Doyle| Date: Wed, 20 Apr 2022 00:00:00 +0000

The need for agility can often sideline security best practices; we explore how to build with security at the forefront without compromising time to delivery.

Read more

Pegasus spyware found on UK government office phone

Credit to Author: Jovi Umawing| Date: Thu, 21 Apr 2022 19:32:28 +0000

The NSO Group’s flagship spyware was found on a device in 10 Downing Street’s network.

The post Pegasus spyware found on UK government office phone appeared first on Malwarebytes Labs.

Read more

California eyes law to protect workers from digital surveillance

Credit to Author: Matthew Finnegan| Date: Thu, 21 Apr 2022 09:01:00 -0700

The California State Assembly is considering new rules that would offer workers greater protection from the use of digital monitoring tools by employers.

The “Workplace Technology Accountability Act” (AB 1651), introduced by Assemblymember Ash Kalra, would create a way to protect workers against the use of technologies that can negatively affect privacy and wellbeing.

The bill would “establish much needed, yet reasonable, limitations on how employers use data-driven technology at work,” Kalra told the Assembly Labor and Employment Committee on Wednesday. “The time is now to address the increasing use of unregulated data-driven technologies in the workplace and give workers — and the state — the necessary tools to mitigate any insidious impacts caused by them.”

To read this article in full, please click here

Read more

Discover the anatomy of an external cyberattack surface with new RiskIQ report

Credit to Author: Christine Barrett| Date: Thu, 21 Apr 2022 16:00:00 +0000

Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise.

The post Discover the anatomy of an external cyberattack surface with new RiskIQ report appeared first on Microsoft Security Blog.

Read more