Employee wellbeing matters: treat your customers like your staff

Employee wellbeing matters: treat your customers like your staff

Digital transformation, AI, data mining and the cloud drive efficiencies and improve customer engagement. An estimated 46% of customer interactions are already automated, with the trend toward automation having further accelerated during the pandemic.  However, as chatbots pick off the simpler queries, contact centre staff are taking the strain having to deal with more complex customer enquiries. This can take a toll on advisors’ mental and emotional wellbeing.  Agent attrition is 15% (average) across UK…

Read More

Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks

Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks

An ex-Canadian government employee pleaded guilty in Florida court earlier this week to charges of involvement with the NetWalker ransomware group. Sebastien Vachon-Desjardins, 34, was accused of conspiracy to commit computer fraud and wire fraud, as well as intentional damage to a protected computer and transmitting a demand concerning damaging a protected computer. Vachon-Desjardins was extradited in March, following the launch of a US global action against the NetWalker cyber-criminal gang in January. “Between May 2020 and January 2021, the…

Read More

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month. Background On June 29, researchers at Horizon3.ai published a blog post about a recently disclosed vulnerability in Zoho ManageEngine ADAudit Plus, a compliance tool that monitors Active Directory (AD). Product Vulnerability Description CVSSv3 Score VPR* Zoho ManageEngine…

Read More

What IT loves about Webex Control Hub

What IT loves about Webex Control Hub

In collaboration with Fernando Quintanilla, Ervin Carrillo, and German Cheung We work from just about anywhere. Coffee shops, airplanes, kitchen tables. The nature of our work is hybrid and when we aren’t in shared spaces with our colleagues, we rely on our collaboration suite to keep us connected. As the collaboration leader for video endpoints across Cisco, my day revolves quite heavily around Webex and delivering consistent collaboration experiences to Webex users. As we work…

Read More

Defining data privacy, residency and sovereignty in the cloud

Defining data privacy, residency and sovereignty in the cloud

Data sovereignty. A simple notion, right? Not so fast. What may appear to be a relatively straightforward concept has instead become an extremely complicated situation due to the numerous regulations defined, countless re-purposed terms used, and the variety of technology capabilities offered. This reality has an impact downstream in the form of significant considerations and ramifications for public and private organizations alike. To begin to simplify this complexity, let’s start with the definition of the…

Read More

Lessons learned from slew of recent data breaches

Lessons learned from slew of recent data breaches

<!– Lessons learned from slew of recent data breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Top of Mind Security Insights from In-Person Interactions

Top of Mind Security Insights from In-Person Interactions

The past few months have been chockfull of conversations with security customers, partners, and industry leaders. After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions. It’s a reminder of just how enriching conversations are and how incredibly interconnected the world is. And it’s only made closer by the security experiences that impact us all.   I had…

Read More

North Korea’s Lazarus Group Suspected of $100m Harmony Hack

North Korea’s Lazarus Group Suspected of 0m Harmony Hack

Blockchain analytics company Elliptic suggested North Korea’s Lazarus Group may be behind last week’s $100m theft from cryptocurrency firm Harmony. In an advisory released on Wednesday, the security experts confirmed Harmony’s initial claims that the funds had been stolen through Horizon Bridge, a platform enabling the transfer of cryptocurrency across blockchains. “The stolen crypto-assets included Ether (ETH), Tether (USDT), Wrapped Bitcoin (WBTC) and BNB,” reads the document. “The thief immediately used Uniswap – a decentralized exchange (DEX)…

Read More

Have you ever found phishing emails confusing? You aren’t alone

Have you ever found phishing emails confusing? You aren’t alone

Kaspersky explores the ways hackers are able to confuse users through seemingly legitimate email templates. Image: GrafVishenka, Getty Images/iStockPhotos While proper cybersecurity training is imperative to keeping organizations safe, users can still be confused when it comes to different types of attempted phishing attacks, leading to potential data breaches. Kaspersky found as part of its Security Awareness Platform and phishing simulator data the emails that users find the most difficult to understand when it comes…

Read More

LockBit ransomware gang promises bounty payment for personal data

LockBit ransomware gang promises bounty payment for personal data

The infamous ransomware-as-a-service group is offering money to researchers and hackers willing to share personal data for exploitation. Image: Piscine26/Adobe Stock In a new twist on the ransomware game, the LockBit cybercrime group has launched a bug bounty program promising money to people willing to share sensitive data that can be exploited in ransomware attacks. A recent tweet posted by the vx-underground account, which publishes malware samples, says that through the new bounty program, LockBit…

Read More
1 2,882 2,883 2,884 2,885 2,886 4,082