Top 5 blockchain challenges businesses face

While blockchain technology can offer great opportunities, the hype surrounding it often leads to unrealistic expectations, according to the World Economic Forum. Blockchain technologies have the potential to improve organizational operating models and security for enterprises. However, many executives still struggle to figure out how to successfully use and find value in the distributed ledger technology, according to Building Value with Blockchain Technology: How to Evaluate Blockchain’s Benefits report from…

July 17, 2019
Read More >>

Infographic: Why email is your weakest security link

Employees receive nearly five phishing emails per work week, according to Avanan. More about cybersecurity One in every 99 work emails is a phishing attack, according to a recent Avanan report. With employees accustomed to a busy inbox, it’s easy to fall victim to a phishing attack disguising itself as a regular message. SEE: Phishing attacks: A guide for IT pros (free PDF) (TechRepublic) From 2013 to 2016, cyberattacks cost…

July 15, 2019
Read More >>

Top 5 cybersecurity challenges for CISOs

CISOs must drive business strategy amid an expanded attack surface and increasing security complexity, according to Fortinet. Chief information security officers (CISOs) have been around for 25 years, but the role continues to evolve as the cybersecurity threat landscape grows more complex and threatens to disrupt business functions, according to Fortinet’s recent The CISO and Cybersecurity: A Report on Current Priorities and Challenges.  More about cybersecurity As the scope of…

July 15, 2019
Read More >>

How will Wi-Fi 5 and WPA2 coexist with Wi-Fi 6 and WPA3?

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist? At HPE Discover 2019, TechRepublic’s James Sanders spoke with Aruba’s Larry Lunetta about how the migration to Wi-Fi 6 is the most complex in roughly a decade. The following is an edited transcript of the interview. More about Mobility Larry Lunetta: So that’s…

July 15, 2019
Read More >>

How to create an access key for the root user in AWS

Performing tasks with root user credentials opens AWS to potentially catastrophic security vulnerabilities. Creating and managing access keys mitigates the risk. Image: marchmeena29, Getty Images/iStockphoto Best practices for Amazon Web Services (AWS) dictate that you should not perform basic everyday tasks using the original root user credentials created when you first registered your AWS account. Root user credentials allow access to everything in your AWS system, without any restrictions, creating…

July 12, 2019
Read More >>

Corporate users struggle to identify phishing attacks, other security threats

An audit of security awareness conducted by Proofpoint found that users on average answered 22% of security-related questions incorrectly. Your organization may use the best software, hardware, and other resources to protect against phishing attacks, malware, ransomware, and other security threats. But all the defenses that guard your front gates can only do so much if your employees aren’t also aware of and alert to the potential dangers from hackers…

July 10, 2019
Read More >>

How to securely and completely delete files in Windows 10 without third-party software

Deleting files in Windows 10 does not really delete the file. Security best practice requires deleted files to be completely overwritten more than once. Image: vbacarin, Getty Images/iStockphoto More about Windows In general, when you delete a file or directory in Microsoft Windows 10 it is moved to a special location known as the Recycle Bin. If you want, you can retrieve a file from the Recycle Bin and restore…

July 9, 2019
Read More >>

How to secure your Zoom conference line from hackers

A Zero Day vulnerability allows any website to open up a video-enabled call on a Mac with the Zoom app installed. Here’s how to patch it. A Zero Day vulnerability in the Mac Zoom Client allows any malicious website to enable the machine’s camera without the user’s permission, potentially impacting the 700,000+ companies worldwide using Zoom for video conferencing each day, security researcher Jonathan Leitschuh disclosed in a post on…

July 9, 2019
Read More >>

How financial services companies can protect against mobile threats

Financial services organizations face a variety of cyber threats. But mobile risks represent a major Achilles’ heel for the industry, says a new report from Wandera. Like most companies and consumers, the financial services industry has become dependent on mobile communications as a way to conduct business, manage client information, exchange data, and work with customers. But without the proper protections in place, the mobile landscape can be a risky…

July 9, 2019
Read More >>