Discover the latest best practices and technologies for securing endpoints, a critical aspect of any organization’s cybersecurity strategy. As cyber threats continue to evolve, securing endpoints has never been more important.
There are a lot of different security technologies for consumers, and most of them cost money to use. Avast is an exception to that norm, offering fully-functional, free anti-virus security technology to consumers – but why do they do it? In a video interview from the show floor of last week’s RSA Conference, Ondrej Vlcek,…
Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to stop advanced security threats. But picking the right EDR solution for your business can be a daunting task. We’re here to help. Answer a few simple questions to find out which…
The personal information of about 30,000 customers of the South Korean cryptocurrency exchange Bithumb was recently exposed when a Bithumb employee’s home computer was hacked, according to Yonhap News. While Bithumb says no passwords were stolen, Yonhap reports that some customers lost funds as a result of the attack. Brave New Coin reports that the…
By Maxim Sovetkin, Itransition Millions of email and social networking logins and passwords become public almost every month. You don’t have to be an IT guru to realize that a password, no matter how complicated, is no longer an adequate security tool. The way users choose services is changing, adding more strains on security protocols.…
It’s a pretty safe bet that your company is storing valuable and confidential information on one or more Windows file servers right now. What may be less obvious is to what extent those servers have been appropriately hardened and locked down to protect the data from unauthorized access. If you’re not sure where to begin,…
Because many modern security systems rely on users’ personal information, also known as PII, or personally identifiable information, a data breach can potentially weaken your security posture not just in a single context, but in all contexts. Stefan Frei, Ph.D., research vice president at security research firm NSS Labs , and Bob Walder, NSS Labs’…
If you’ve ever consulted with a computer security expert and they seemed a little paranoid, consider it a good thing – paranoia is an essential component to effective security. Conversely, lack of paranoia is a risk factor, which is a key weakness in security for Mac computers –particularly in the enterprise. Mac OS X has…
While installing antivirus software is a good start to safe Internet browsing, it’s only a start. There is much more you can do to help protect yourself when browsing the Web than merely installing antivirus. Here I’ll share a couple ways. In this article you’ll discover extra security features in Firefox and Chrome, sandboxing to…