What do users and IT have in common? They’re both to blame for poor remote security practices

What do users and IT have in common? They’re both to blame for poor remote security practices

One in four remote workers reuses work credentials on consumer sites, but IT isn’t doing them any favors by reportedly failing to provide essential protection while away from the office. Image: iStockphoto/Metamorworks Remote work has proliferated since the beginning of the COVID-19 pandemic, but nearly a year in cybersecurity hasn’t caught up, leaving businesses incredibly vulnerable. The thing is, IT software company Ivanti found, it isn’t just end users to blame for the shortcomings.  SEE: Identity…

Read More

5 tips to protect your organization against the next cyberattack

5 tips to protect your organization against the next cyberattack

To better combat cyberattacks, prevention is better than detection, says Check Point Software. Image: iStock/sdecoret As the world grappled with the coronavirus pandemic last year, ransomware and other forms of cyberattack shifted into high gear. Savvy cybercriminals knew just which vulnerabilities to exploit to carry out their attacks. In the face of looming cyberthreats, a report released Wednesday by cyber threat intelligence provider Check Point Research provides tips on how to better protect your organization…

Read More

Celebrating the One-Year Anniversary of DevNet Certifications

Celebrating the One-Year Anniversary of DevNet Certifications

Today, February 24, 2021 is the first anniversary of the launch of the Cisco DevNet certifications. Today, I am incredibly proud and honored to celebrate you – the DevNet community, the DevNet 500, and the DevNet Class of 2020. Over 8,000 of you have become part of the DevNet Class of 2020! You have earned over 10,500 DevNet certifications, ranging from DevNet Associate to DevNet Professional and DevNet Specialist! Your software and automation skills are…

Read More

Infosecurity Europe 2021 Postponed Due to #COVID19

Infosecurity Europe 2021 Postponed Due to #COVID19

Europe’s leading information security event Infosecurity Europe, originally scheduled for June 8-10 2021 at London Olympia, will now take place at a later date in the year, organizer Reed Exhibitions has announced. This is due to the current situation regarding the COVID-19 pandemic. A statement from Reed Exhibitions outlined: “Following the UK Prime Minister’s announcement on the gradual lifting of COVID-19 restrictions in England we are now working closely with our partners and venue to obtain suitable…

Read More

Former Power Company Boss to Admit Wire Fraud

Former Power Company Boss to Admit Wire Fraud

The former CEO of a regulated electric and natural gas public utility in South Carolina is due to plead guilty today in federal court to conspiracy to commit mail and wire fraud. Kevin B. Marsh is the ex-CEO of SCANA Corporation and former chairman of its board of directors. The Cayce-based company, which was the only Fortune 500 company in South Carolina, merged with Dominion Energy in January 2019 after an incident known as the Nukegate scandal caused its stock price…

Read More

Technology: The pathway to financial inclusion – Cisco Blogs

Technology: The pathway to financial inclusion – Cisco Blogs

Grace Wong, Founder of Liven This blog post comes from Grace Wong, the Founder of Liven, Australia’s biggest loyalty-based payment network and the first platform to “gamify” payments in the offline world. LivenPay won Sir Richard Branson’s Extreme Tech Challenge for Digital Payments and Blockchain in 2019. Grace presented at Cisco’s Women Rock-IT event on February 18. Click here to watch the recording on demand. My parents grew up in an environment where opportunity simply…

Read More

Simplifying Profitability and Differentiation – Cisco Blogs

Simplifying Profitability and Differentiation – Cisco Blogs

As Cisco partners, you’ve let us know that deal registration is your most valued profitability program. However, you’ve also made it clear that it has too many sub-programs and rules to remember! We understand. When you drive profitability behaviors, like hunting or teaming, you should be able to receive the best available discounts without the hassle and complexity of figuring out the incentive selection process. In response, I have good news: We have heard your…

Read More

Poor Remote Working Behaviors and Procedures Putting Orgs at Risk

Poor Remote Working Behaviors and Procedures Putting Orgs at Risk

One-fifth of remote workers in the UK recycle their work email or password to log into consumer websites and apps, such as online shopping and even dating, increasing the risk of their corporate credentials being stolen. This is according to Ivanti’s Secure Consumer Cyber Report, which surveyed 1000 UK home workers about their cybersecurity behaviors. The research revealed that poor cybersecurity practices by home workers are prevalent, which is putting organizations at greater risk of cyber-attacks….

Read More

Cisco User Defined Network: Redefining Secure, Personal Networks – Cisco Blogs

Cisco User Defined Network: Redefining Secure, Personal Networks – Cisco Blogs

Connecting all your devices to a shared network environment such as dorm rooms, classrooms, multi-dwelling building units, etc. may not be desirable as there are too many users/devices on the shared network and onboarding of devices is not secure. In addition, there is limited user control; that is, there is no easy way for the users to deterministically discover and limit access to only the devices that belong to them. You can see all users’…

Read More

Medical Data of 500,000 French Residents Leaked Online

Medical Data of 500,000 French Residents Leaked Online

Sensitive medical data belonging to nearly half a million French people has been stolen and leaked online, according to a joint investigation by news source Libération and French cybersecurity blog Zataz. The exposed data, which can be accessed from multiple sites, includes names, phone numbers, and postal addresses of 491,840 individuals. In some cases, it is accompanied by identifying information including Social Security number, birth date, blood type, GP, health insurance provider, medical treatments, HIV status, and pregnancy test results. …

Read More
1 3,821 3,822 3,823 3,824 3,825 4,085