Back-to-Basics: Keep Software Patched

Back-to-Basics: Keep Software Patched

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More

3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More

3 Tips to Protect Yourself From XLoader Malware | McAfee Blogs 3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware | McAfee Blogs 3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More

Web-based network device monitoring using “johann,” Part 3

Web-based network device monitoring using “johann,” Part 3

Welcome to Part 3 of this series of the web-based network device monitoring tool “johann.” In case you missed it, Part 1 gave you an introduction to johann. In Part2, you get a look behind the scenes of how I implemented the south-bound communication between the application and the network device with the network device API RESTCONF. In this Part 3 we will focus on the web-based application itself: a short introduction to the used…

Read More

Cybersecurity professionals: Positive reinforcement works wonders with users

Cybersecurity professionals: Positive reinforcement works wonders with users

The blame game is not working; experts suggest using positive reinforcement to improve employee attitude and performance. Image: iStock/jauhari1 With all the negativity in the world, it feels like a good time to remind everyone that positive reinforcement is an effective tool for improving employee behavior when it comes to cybersecurity. SEE: Security incident response policy (TechRepublic Premium) To keep everyone on the same page, let’s use the definition championed in Courtney E. Ackerman’s PositivePsychology.com…

Read More

Juniper software triggers network response to threats

Juniper software triggers network response to threats

Juniper Networks continues to grow its enterprise cloud-security family with a new product that promises to protect application workloads in any cloud or on-premises environment. The company rolled out Juniper Cloud Workload Protection package–a  lightweight software agent that the company says controls application execution and monitors application behavior to help businesses spot and fix anomalies. The idea is to provide protection from attackers looking to exploit application vulnerabilities, said Kate Adam, senior director of security…

Read More

The Next Wave of Hybrid Learning – Cisco Blogs

The Next Wave of Hybrid Learning – Cisco Blogs

The desire to learn is innate to us, and access to classrooms is the bridge that connects learners with educators. The pandemic has forced an experiment that moved education to digital classrooms, and online learning proved to be the catalyst for creating novel learning models for imparting knowledge and developing new skills. With this evolution of virtual learning, the construct of distance is dissolving, and hybrid experiences have become ubiquitous, necessary, and many times proved…

Read More

Why industrial ethernet switches? Putting the “purpose” in purpose-built – Cisco Blogs

Why industrial ethernet switches? Putting the “purpose” in purpose-built – Cisco Blogs

If you’re going hiking, you need hiking boots—not dress shoes. In the same way, if you’re connecting assets in an industrial environment, you need an industrial ethernet switch, not an enterprise switch. Here’s what’s different about industrial ethernet switches. Tight spaces: round pegs don’t fit in square holes Industrial Ethernet switches bring high-speed connectivity outside traditional office buildings, factories, ports and terminals, railways, ships, energy farms, or mines. They connect industrial Internet of Things (IoT)…

Read More
1 3,601 3,602 3,603 3,604 3,605 4,236