Third of Office Workers Warned After Sharing Data Via Unofficial Apps

Third of Office Workers Warned After Sharing Data Via Unofficial Apps

Almost a third (30%) of global office workers have been admonished by their bosses after sending sensitive business and personal information via non-approved online channels, according to Veritas Technologies. The data protection vendor polled 12,500 white collar workers in Europe, the Middle East, APAC and the US to better understand the risks they’re taking during lockdown. The vast majority admitted to sharing business-critical data (71%) and sensitive personal information (75%) via IM or online collaboration…

Read More

Record Number of Cyber-Incidents Hit US Schools in 2020

Record Number of Cyber-Incidents Hit US Schools in 2020

Publicly disclosed cybersecurity incidents at US schools surged 18% over the past year to hit a record number of breaches, ransomware outbreaks and more, according to a new report. Non-profit the K12 Security Information Exchange claimed there were 408 such incidents in 2020, which equates to more than two per school day. The largest number (45%) were recorded as unattributed malware, class and meeting invasions, email invasion, website and social media defacement, and a large…

Read More

How to reason your way through the Certified Protection Professional (CPP) exam

How to reason your way through the Certified Protection Professional (CPP) exam

How to reason your way through the Certified Protection Professional (CPP) exam | 2021-03-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Employers aren’t training staff to use new tech tools. Employees are paying the price

Employers aren’t training staff to use new tech tools. Employees are paying the price

Organizations have invested millions in new technology over the past year, yet fewer than one in 10 businesses have trained staff in to use these tools. Little surprise, then, that employees are using them incorrectly – and getting in trouble for it. Research suggests training is lagging behind tech investment, which results in staff using workplace tools the wrong way. Image: djedzura/iStock UK businesses boosted their digital investment by an average of £1.48 million in…

Read More

Is the World Economic Forum’s prediction of a global cybersecurity failure in the next 10 years avoidable?

Is the World Economic Forum’s prediction of a global cybersecurity failure in the next 10 years avoidable?

Is the World Economic Forum’s prediction of a global cybersecurity failure in the next 10 years avoidable? | 2021-03-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

Moving from ‘working at from home’ to a hybrid work experience

Moving from ‘working at from home’ to a hybrid work experience

Moving from ‘working at from home’ to a hybrid work experience | 2021-03-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Combating Risk Negligence Using Cybersecurity Culture

Combating Risk Negligence Using Cybersecurity Culture

With a growing number of threat sources and successful cybersecurity attacks, organizations find themselves in a tricky spot if they wish to survive cyberspace. Oftentimes, the adversaries are not the challenge; the obstacle is the organization’s culture. Just like culture influences who we are as a people, culture influences the cybersecurity tone of an organization. Every organization has its own unique fit and feel. Unfortunately, the fit and feel of an organization’s culture is not…

Read More

Microsoft Exchange hack: Why so many enterprises still run their own Exchange servers

Microsoft Exchange hack: Why so many enterprises still run their own Exchange servers

Commentary: Enterprises try their best to secure their data, but running on-premises mail servers arguably doesn’t do this. So why do they do it, anyway? Image: Denis Isakov, Getty Images/iStockphoto We can have a debate about how soon enterprises should embrace cloud. After all, with roughly 94% of the $3.9 trillion in global IT spending still going to on-premises software, hardware and services, we’re many years away from the last data center getting unplugged. But can…

Read More

Understanding DevOps personas and perspectives – VMware Cloud Community

Understanding DevOps personas and perspectives – VMware Cloud Community

Recognizing the different DevOps personas and understanding their unique perspectives will help to improve collaboration and drive alignment across teams and initiatives.    Despite good intentions, many traditional IT organizations struggle to show successful outcomes from DevOps initiatives quickly enough to generate and maintain momentum. Early attempts can be hampered by a steep operational learning curve, resistance to change (“we can’t because…”), and poorly aligned expectations. To avoid these pitfalls and accelerate these DevOps initiatives,…

Read More

Basic scripting on Unix and Linux

Basic scripting on Unix and Linux

Creating a script on a Unix or Linux system can be dead easy or surprisingly complex; it all depends on how much you’re trying to get the script to do. In this post, we look at scripting basics—at how to get started if you have never built a script before. Identifying the shell Unix and Linux systems today have a number of shells that you can use. Each shell is a command interpreter. It reads…

Read More
1 3,791 3,792 3,793 3,794 3,795 4,091