45% of Businesses Say Employees Are Biggest Security Risk

45% of Businesses Say Employees Are Biggest Security Risk | #TpromoCom #data #hacker #hackers #cybersecurity | Despite facing mostly external attacks, nearly half (45%) of businesses believe their greatest security risk comes from their own employees, according to the 2018 Netwrix Cloud Security Report. The blame falls more heavily on IT staff (39%) and businesses users (33%) as much as, or more than, it does on cloud providers (33%).

Common cloud security concerns are the same across respondents, which represent 853 organizations. The greatest is risk of unauthorized access (69%), risk of malware infiltrations (50%), and the inability to monitor activity of employees in the cloud (39%).

To read the remainder of this news story, click here.

Please follow and like us:

Safeguarding your biggest cybersecurity target: Executives

Safeguarding your biggest cybersecurity target: Executives | #TpromoCom #cybersecurity #hackers #hacker |  Senior executives are among the favorite targets of malicious hackers and other bad actors, in part because they are more likely to hold valuable information — or have a high level of access to such data.

That’s why it’s so important for organizations to make sure C-level officers and other top executives are adhering to the strictest data protection standards and are using appropriate security technologies whenever possible, including when they travel to high-risk locations.

“Executives are targeted for their access and influence within organizations, especially…  To read the remainder of this news story, click here.

Please follow and like us:

Incompetence is More Frightening Than Hackers

Incompetence is More Frightening Than Hackers | #TpromoCom #hackers #hacker #IT #network #cybersecurity |  I spent much of Saturday wondering if the false warning of an imminent ballistic missile strike on Hawaii was the work of malicious hackers. That scenario would be strangely preferable, having a malevolent entity to blame, instead of accepting that the entire system for warning the public really can be activated by one employee pressing the wrong button, as the state’s governor described it. Apparently it wasn’t even a button; it was a drop-down menu on a computer screen.

To read the remainder of this news story, click here.

Please follow and like us:

Equifax could face a massive fine for another security breach

Equifax could face a massive fine for another security breach | #TpromoCom # Equifax #databreach #data | Two top Senate Democrats are seeking broad new powers for the U.S. government to slap Equifax and its peers with massive fines if they suffer major cyber attacks — money that would then be returned to the millions of Americans affected by such a breach.

The idea is the centerpiece of the so-called Data Breach Prevention and Compensation Act, a bill to be introduced on Wednesday by Democratic Sens. Elizabeth Warren and Mark Warner. Cyber attacks may be inevitable, but the lawmakers feel that the federal government for too long has lacked the power to penalize entities that fail to protect their stores of sensitive consumer data.

To read the remainder of this news story, click  here.

Please follow and like us:

Intel CEO vows to keep customer data safe in response to chip security flaws

Intel CEO vows to keep customer data safe in response to chip security flaws | #TpromoCom #data #cybersecurity #Intel  |  Chip maker Intel Corporation’s chief executive said late Monday that data security is the company’s “primary focus,” responding to recent findings of chip security flaws.

Brian Krzanich, chief executive officer of Intel Corp., addressed the industry at the opening of the 2018 Consumer Electronics Show, an annual trade show presenting new products and technologies in the consumer electronics industry, which kicked off on Monday in the U.S. city of Las Vegas.

To read the remainder of this news story, click here.

Please follow and like us:

How antivirus software can be turned into a tool for spying

How antivirus software can be turned into a tool for spying | #TpromoCom #antivirus #spy #hacker #hackers |  Security software runs closest to the bare metal of a computer, with privileged access to nearly every program, application, Web browser, e-mail and file. There is good reason for this: Security products are intended to evaluate everything that touches your machine in search of anything malicious, or even vaguely suspicious.

By downloading security software, consumers also run the risk that an untrustworthy antivirus maker — or hacker or spy with a foothold in its systems — could abuse that deep access to track customers’ every digital movement. To read the remainder of this news story, click here.

Eugene Kaspersky, chief executive of Kaspersky Labs, has said he would allow the US government to inspect his company’s source code to allay distrust of its antivirus and security products.

Please follow and like us:

These LA Startups Are What Stand Between Hackers and Your Medical Devices

These LA Startups Are What Stand Between Hackers and Your Medical Devices | #TpromoCom #cybersecurity #hacker #medical #hackers |  LOS ANGELES – The term cyber threat information sharing tends to evoke images from a techno spy thriller: banks of computer monitors manned by steely-eyed operators, wall-sized screens with flashing red dots on one side of the globe that send even redder arrows streaking toward targets on the other side.

For major threat sharing operations, such as the Homeland Security Department’s National Cybersecurity and Communications Integration Center or a joint facility that serves major financial institutions, that image may not be far off. To read the remainder of this news story, click here.

Please follow and like us:

Drug smugglers are ‘hacking into computers that control worldwide shipping’ sparking fears terrorists could deliberately capsize one of the enormous vessels

Drug smugglers are ‘hacking into computers that control worldwide shipping’ | #TpromoCom #drugs #hackers #hacker #shipping | sparking fears terrorists could deliberately capsize one of the enormous vessels.

The gangs gain remote access when a widely used system is poorly protected to alter container ship manifests, making their contraband shipment appear innocent and thereby avoiding detection. To read the remainder of this news story, click here.

Experts fear hackers could cause a ship to capsize. Pictured: MV Hoegh Osaka ran aground in the Solent. There is no suspicion that the ship’s loading plans were altered or hacked

Please follow and like us: