Pulse VPN patched their vulnerability, but businesses are trailing behind

Credit to Author: Pieter Arntz| Date: Fri, 18 Oct 2019 16:36:36 +0000

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Categories:

Tags:

(Read more…)

The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.

Read more

Why all organizations must better protect sensitive data

Credit to Author: David Ruiz| Date: Thu, 17 Oct 2019 17:30:04 +0000

The truth is that companies, businesses, and organizations have an obligation to the data that belongs to their employees, users, and customers. For some organizations, that obligation is a matter of real, physical safety.

Categories:

Tags:

(Read more…)

The post Why all organizations must better protect sensitive data appeared first on Malwarebytes Labs.

Read more

Securing the managed service provider (MSP)

Credit to Author: William Tsing| Date: Fri, 11 Oct 2019 18:04:49 +0000

Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

Categories:

Tags:

(Read more…)

The post Securing the managed service provider (MSP) appeared first on Malwarebytes Labs.

Read more

Tackling the BEC Epidemic in a New Partnership with INTERPOL

Credit to Author: erinj| Date: Wed, 09 Oct 2019 13:45:45 +0000

In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. Trend Micro has built a formidable array of resources over the past few years to…

The post Tackling the BEC Epidemic in a New Partnership with INTERPOL appeared first on .

Read more

What role does data destruction play in cybersecurity?

Credit to Author: Kayla Matthews| Date: Fri, 20 Sep 2019 18:18:26 +0000

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Categories:

Tags:

(Read more…)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

Read more

When corporate communications look like a phish

Credit to Author: William Tsing| Date: Mon, 09 Sep 2019 15:36:11 +0000

Before organizations engage in gnashing of teeth over the “ignorant user” and the cost of training, think about how much email users encounter and whether corporate communications look like phishes themselves.

Categories:

Tags:

(Read more…)

The post When corporate communications look like a phish appeared first on Malwarebytes Labs.

Read more

5 simple steps to securing your remote employees

Credit to Author: David Ruiz| Date: Wed, 04 Sep 2019 14:06:26 +0000

Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.

Categories:

Tags:

(Read more…)

The post 5 simple steps to securing your remote employees appeared first on Malwarebytes Labs.

Read more

Making the case: How to get the board to invest in higher education cybersecurity

Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000

CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in higher education cybersecurity appeared first on Malwarebytes Labs.

Read more