Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Implementing Security on All Edges

Implementing Security on All Edges

Hybrid networks, multi-cloud, Internet-of-Things, remote work and digital innovations are all driving more distributed networks and a much more expansive attack surface. The network perimeter that used to be so clearly defined now extends across a spectrum of enterprise facilities, branch offices, homes, other remote locations and multiple clouds.  The reality is that security needs to be on the LAN edge, WAN edge and cloud edge.  All edges must now be secured, but how do…

Read More

Top 5 ways to protect MFA codes

Top 5 ways to protect MFA codes

Using SMS for multi-factor authentication is helpful, but not always secure or reliable. What if you lose your phone? Tom Merrittlists five additional ways to receive MFA codes, without SMS. Someone wrote in, after seeing my Top 5 about avoiding using SMS for multi-factor authentication, and asked, “Do you have any suggestions on how to protect myself from getting locked out of my accounts if my phone disappears or dies?” Great question. One advantage of…

Read More

Internet 2021: Here’s what the new year will (and won’t) bring | ZDNet

Internet 2021: Here’s what the new year will (and won’t) bring | ZDNet

I’m lucky. I have decent cable internet to my home office. It’s not cable gigabit, which is not the same thing as real fiber gigabit, but at 300Mbps, it’s more than good enough. But, most people aren’t so lucky.  The FCC official broadband definition is a mere 25 Mbps down and 3 Mbps up. Soon to be out of office FCC chairman Ajit Pai would like to have reduced that number to 10 Mbps in…

Read More

To Share, Or Not to Share – Cyber Defense Magazine

To Share, Or Not to Share – Cyber Defense Magazine

As consumers’ views on personal data evolve, it’s time to re-think data privacy By Kris Lovejoy, Global Consulting Cybersecurity Leader, EY Today organizations are standing at a crossroads when it comes to data privacy. In one direction, a series of high-profile data breaches and scandals in recent years has eroded consumers’ trust in organizations and led to them becoming ever more vigilant about their privacy. This consumer vigilance, combined with a regulatory drive to tighten…

Read More

Docker Captain Take 5 – Gianluca Arbezzano – Docker Blog

Docker Captain Take 5 – Gianluca Arbezzano – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

How to create a good privacy policy for your website: Tips from the Better Business Bureau

How to create a good privacy policy for your website: Tips from the Better Business Bureau

The BBB provides recommendations on what to include in your business website’s privacy policy. Image: Getty Images/iStockphoto The Better Business Bureau (BBB) has a novel idea: Write an understandable privacy policy for business websites and don’t hide the document on the last webpage in barely readable print. That said, first things first–from the BBB article BBB Tip: Writing an Effective Privacy Policy for Your Business’ Website: “Whether you are processing credit-card payments, saving shipping or…

Read More

How to deploy 802.1x for Wi-Fi using WPA3-Enterprise

How to deploy 802.1x for Wi-Fi using WPA3-Enterprise

Wi-Fi Protected Access 3 (WPA3) has brought significant security improvements to Wi-Fi networks, particularly WPA-3Enterprise, which includes tweaks to make authenticating to the network more secure. One of these is has to do with 802.1x authentication that is used to determine whether Wi-Fi clients will be granted access to the enterprise network. The enterprise mode of WPA has always allowed you to give each user a unique username/password to login to the Wi-Fi or to…

Read More

Privacy in 2020 and What to Expect for the Year Ahead

Privacy in 2020 and What to Expect for the Year Ahead

2020 was dominated by news of the pandemic and anchored by reality that we all found ourselves in – entire families logging in remotely, trying to keep school and work feeling “normal.” While we tested the limits of what a home office could sustain, the privacy and security of a fully remote world was put front and center. In this piece, we take a look at a few privacy highlights that will likely impact your business…

Read More
1 139 140 141 142 143 268