12 security tips for the ‘work from home’ enterprise

Credit to Author: Jonny Evans| Date: Fri, 13 Mar 2020 06:26:00 -0700

If you or your employees are working from home while our governments lurch awkwardly through the current crisis, then there are several security considerations that must be explored.

Your enterprise outside the wall

Enterprises must consider the consequences of working from home in terms of systems access, access to internal IT infrastructure, bandwidth costs and data repatriation.

What this means, basically, is that when your worker accesses your data and/or databases remotely, then the risk to that data grows.

While at normal times the risk is only between the server, internal network and end user machine, external working adds public internet, local networks and consumer-grade security systems to the risk mix.

To read this article in full, please click here

Read more

Enterprise resilience: Backup and management tips for iOS, Mac

Credit to Author: Jonny Evans| Date: Fri, 06 Mar 2020 06:30:00 -0800

Apple’s solutions are seeing increasing use across the enterprise, but do you have a business resilience strategy in place in case things go wrong?

If you’re one of the estimated 73% of SMBs that have not yet made such preparation, now might be a good time to start.

Your data is your business

It’s challenging enough when a consumer user suffers data loss as precious memories and valuable information go up in the digital smoke. Natural disasters, technology and infrastructure problems or human-made problems such as burglary, cyberattacks or civil unrest can all impact the sanctity of your systems, whatever platform you use. It matters because in today’s connected world, your data is your business.

To read this article in full, please click here

Read more

Apple, the FIDO Alliance and the future of passwords


Apple is the latest firm to join the FIDO Alliance, an industry standards group developing more secure ways to log in to online accounts and apps using multi-factor authentication (MFA), biometric authentication and physical security keys. Computerworld's Lucas Mearian joins Ken Mingis and Juliet Beauchamp to discuss the Apple move, how different forms of authentication work and how far away we are from a password-less world.

Read more

Facebook sues data analytics firm OneAudience over malicious SDK

Credit to Author: Lisa Vaas| Date: Mon, 02 Mar 2020 11:52:59 +0000

Facebook says OneAudience paid developers to install its social-media-profile-looting SDK into their apps to get marketing data for clients.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/cTLgFQQq3iM” height=”1″ width=”1″ alt=””/>

Read more

How and why you need HomeKit-secured smart homes

Credit to Author: Jonny Evans| Date: Thu, 27 Feb 2020 04:40:00 -0800

Once upon a time the Internet was amazing, enabling niche interests and connecting people. Apple’s iMac was the epitome of the era, while the iPhone became the prophet of change.

What is HomeKit-secured and why should you use it?

These days hackers break into home networks using our routers and smart home devices, which is why everyone must learn how to use HomeKit-secured routers to keep their connected homes safe.

Apple announced HomeKit-secured routers at WWDC 2019. The first few devices to support the tech recently began to reach market, including options from Linksys and (now) Amazon’s Eero routers.

To read this article in full, please click here

Read more

Apple’s iOS pasteboard leaks location data to spy apps

Credit to Author: John E Dunn| Date: Wed, 26 Feb 2020 16:28:24 +0000

A developer has discovered that malicious apps could exploit the pasteboard to work out a user’s location.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/C0t83agCkD4″ height=”1″ width=”1″ alt=””/>

Read more

Android 11 to clamp down on background location access

Credit to Author: John E Dunn| Date: Tue, 25 Feb 2020 17:51:53 +0000

Is Android finally about to get on top of the issue of apps that quietly suck up location data?<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/pgha-yLJwm8″ height=”1″ width=”1″ alt=””/>

Read more

Why every user needs a smart speaker security policy

Credit to Author: Jonny Evans| Date: Mon, 24 Feb 2020 06:06:00 -0800

Does your voice assistant wake up randomly when you are engaged in normal conversation, listening to radio, or watching TV? You’re not alone, and this may have serious implications in enterprise security policy.

All things being equal (they’re not)

“Anyone who has used voice assistants knows that they accidentally wake up and record when the ‘wake word’ isn’t spoken – for example, ‘seriously’ sounds like the wake word ‘Siri’ and often causes Apple’s Siri-enabled devices to start listening,” the Smart Speakers research study says.

To read this article in full, please click here

Read more

Apple joins industry effort to eliminate passwords

Credit to Author: Lucas Mearian| Date: Fri, 21 Feb 2020 03:00:00 -0800

In a somewhat unusual move for Apple, the company has joined the Fast IDentity Online (FIDO) Alliance, an authentication standards group dedicated to replacing passwords with another, faster and more secure method for logging into online services and apps.

Apple is among the last tech bigwigs to join FIDO, whose members now include Amazon, Facebook, Google, Intel, Microsoft, RSA, Samsung, Qualcomm and VMware. The group also boasts more than a dozen financial service firms such as American Express, ING, Mastercard, PayPal, Visa and Wells Fargo.

“Apple is not usually up front in joining new organizations and often waits to see if they gain enough traction before joining in. This is fairly atypical for them,” said Jack Gold, president and principal analyst at J. Gold Associates. “Apple is often trying to present [its] own proposed industry standards for wide adoption, but is generally not an early adopter of true multi-vendor industry standards.

To read this article in full, please click here

Read more

Private photos leaked by PhotoSquared’s unsecured cloud storage

Credit to Author: Lisa Vaas| Date: Wed, 19 Feb 2020 11:49:20 +0000

With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/v6L-VwD68-Y” height=”1″ width=”1″ alt=””/>

Read more