Tag: Security | TechRepublic

Security awareness and training policy

This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: SUMMARY A security policy is only as valuable as the knowledge…

Internet and email usage policy

Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware and data theft, all…

Royal ransomware spreads to Linux and VMware ESXi

A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. Learn more about this security threat and how to protect from it. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic. This…

New virtual data fabric to support DoD cyber testing

As cybersecurity threats increase in complexity and volume, the Department of Defense is turning to new technologies for help. The post New virtual data fabric to support DoD cyber testing appeared first on TechRepublic. This article has been indexed from…

Personal data encryption in Windows 11

There’s a new, more secure way to encrypt files in Windows 11, but it’s only an option for building secure applications, not a replacement for BitLocker. The post Personal data encryption in Windows 11 appeared first on TechRepublic. This article…

Metaverse adds new dimensions to Web 3.0 cybersecurity

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game will continue, but with more dimensions. The post Metaverse adds new dimensions to Web 3.0 cybersecurity appeared first on TechRepublic.…

TrickGate crypter discovered after 6 years of infections

New research from Check Point Research exposes a crypter that stayed undetected for six years and is responsible for several major malware infections around the globe. The post TrickGate crypter discovered after 6 years of infections appeared first on TechRepublic.…

Lifetime VPNSecure subscriptions are now just $39.99

Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Lifetime VPNSecure…

The importance of data retention policies

A data retention policy is the first step in helping protect an organization’s data and avoid financial, civil, and criminal penalties that increasingly accompany poor data management practices. This article outlines what a data retention policy is and why it’s…

Auditing and logging policy

Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems,…

The headache of changing passwords

Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: The…

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic. This article has…

New cybersecurity BEC attack mimics vendors

A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post New cybersecurity BEC attack mimics vendors appeared first on TechRepublic.…

Access management policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while…

Lifetime VPNSecure subscriptions are now just $39.99

Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Lifetime VPNSecure…

The headache of changing passwords

Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: The…

New cybersecurity BEC attack mimics vendors

A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post New cybersecurity BEC attack mimics vendors appeared first on TechRepublic.…

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic. This article has…

IT staff systems and data access policy

IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from TechRepublic Premium offers…

Zero-trust security: A cheat sheet (free PDF)

Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a once-safe device can’t be…

Zero trust security: A cheat sheet (free PDF)

Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a once-safe device can’t be…

CIOs hold greater organizational leadership status

Foundry’s study found the role has been significantly elevated because of the economy, and CIOs are recognized as strategic business partners by their LOB peers. The post CIOs hold greater organizational leadership status appeared first on TechRepublic. This article has…

Get nine ethical hacking courses for just $30

Learn some of today’s most popular attacks and how to mitigate them with The All-in-One Ethical Hacking & Penetration Testing Bundle. The post Get nine ethical hacking courses for just $30 appeared first on TechRepublic. This article has been indexed…

Unphishable mobile MFA through hardware keys

With Azure AD and FIDO security keys, you can make MFA more secure and avoid having to provision certificates on everyone’s phones. The post Unphishable mobile MFA through hardware keys appeared first on TechRepublic. This article has been indexed from…

FBI takes down Hive ransomware group

Working with international law enforcement, the FBI said it has seized control of the servers the Hive group uses to communicate with members. The post FBI takes down Hive ransomware group appeared first on TechRepublic. This article has been indexed…

How to use Microsoft KQL for SIEM insight

Microsoft’s cloud-hosted SIEM software comes with a suite of powerful analytics tools designed to read logs and find anomalies in the data haystack. The post How to use Microsoft KQL for SIEM insight appeared first on TechRepublic. This article has…

Securing IoT with Microsoft Defender for IoT sensors

Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post Securing IoT with Microsoft Defender for IoT sensors appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…

The risks of 5G security

Unless you’ve been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The post The risks of 5G security appeared first on TechRepublic. This article has been indexed from Security |…

Learn cutting-edge ethical hacking techniques for just $39.99

The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post Learn cutting-edge ethical hacking techniques for just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…

10 cybersecurity predictions for tech leaders in 2023

From ransomware to third-party vendor security to software-defined perimeters, these cybersecurity topics should be on IT leaders’ radar. The post 10 cybersecurity predictions for tech leaders in 2023 appeared first on TechRepublic. This article has been indexed from Security |…

Checklist: Securing Windows 10 systems

Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10…

Malware response checklist

Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is…

Kaspersky releases 2023 predictions

A new report from Kaspersky details what their digital forensics and incident response teams predict as the main 2023 threats to corporations and government agencies. Learn more about it. The post Kaspersky releases 2023 predictions appeared first on TechRepublic. This…

Secure your email with this top-rated backup service

Mail Backup X is the ultimate solution to protect your email from corruptions and crashes. The post Secure your email with this top-rated backup service appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…

IT email templates: Security alerts

All company communication needs may vary but certain standard template messages can come in handy for IT staff to keep employees up to date on “need to know” informational bulletins. These bulletins may be one-off or regularly scheduled communications to…

As a cybersecurity blade, ChatGPT can cut both ways

The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense. The post As a cybersecurity blade,…

Threat attackers can own your data in just two days

This report shows cybercriminals need only a couple days to access your full corporate network and exfiltrate its data. Read on to learn more. The post Threat attackers can own your data in just two days appeared first on TechRepublic.…

Microsoft retracts its report on Mac ransomware

A publication from Microsoft that was taken down January 6 warns about four ransomware families affecting macOS devices. Much of the report closely resembles research published in July by Patrick Wardle. The post Microsoft retracts its report on Mac ransomware…

BCDR Buyer’s Guide For MSPs

When a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and disaster recovery (BCDR) solution to restore data and operations quickly, without sacrificing margin. That means industry-leading recovery technology…

SIRIS Business Continuity and Disaster Recovery

SIRIS is fundamentally different than traditional backup and recovery solutions. Utilizing a cloud-first approach, managed service providers (MSPs) can offer their clients an all-in-one solution that incorporates local backup and recovery with a secure, cloud-based repository and full disaster recovery…

Security risk assessment checklist

Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are under attack. Worse, neither an organization nor its managers need to prove prominent or controversial to prove…

Recent 2022 cyberattacks presage a rocky 2023

A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats. The post Recent 2022 cyberattacks presage a…

Cloud email services bolster encryption against hackers

Google, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector attacks from the first half of 2022. The post Cloud email services bolster encryption against hackers appeared first on TechRepublic.…