In the face of recession worries, cybersecurity teams would be least affected by staffing cuts in 2023, according to a survey of C-suite executives by (ISC)². The post Cybersecurity pros less likely to be impacted by layoffs if economy slows…
Tag: Security | TechRepublic
Cryptocurrency users in the US hit by ransomware and Clipper malware
Learn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware. The post Cryptocurrency users in the US hit by ransomware and Clipper malware appeared first on TechRepublic. This article has been indexed from Security…
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download appeared first on TechRepublic. This article has been indexed…
How to secure your iOS device to prevent unwanted access
Leaving your iOS device unattended can pose a security risk as more iOS users are carrying personal information on their devices. Keep it secure with these handy tips. The post How to secure your iOS device to prevent unwanted access…
What Twitter’s outage says about (over) zealous downsizing
The outage message that Twitter users got last week could be read as a warning for big tech firms looking to slash their IT workforce. The post What Twitter’s outage says about (over) zealous downsizing appeared first on TechRepublic. This…
Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube
A report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and web apps. The post Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube appeared first on TechRepublic. This article has been indexed…
What Twitter outage says about (over) zealous downsizing
The outage message that Twitter users got last week could be read as a warning for big tech firms looking to slash their IT workforce. The post What Twitter outage says about (over) zealous downsizing appeared first on TechRepublic. This…
Security awareness and training policy
This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: SUMMARY A security policy is only as valuable as the knowledge…
Check Point’s annual cybersecurity event spotlights power of AI
The company showcased dozens of new security tools and services to detect and prevent malware, phishing, ransomware and other attacks, but AI took center stage. The post Check Point’s annual cybersecurity event spotlights power of AI appeared first on TechRepublic.…
Internet and email usage policy
Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware and data theft, all…
Royal ransomware spreads to Linux and VMware ESXi
A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. Learn more about this security threat and how to protect from it. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic. This…
This beginner-friendly ethical hacker training is 97% off
The How to Hack from Beginner to Ethical Hacking Certification will teach you how to protect your systems and earn the trust of top clients. The post This beginner-friendly ethical hacker training is 97% off appeared first on TechRepublic. This…
New cybersecurity data reveals persistent social engineering vulnerabilities
Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022. The post New cybersecurity data reveals persistent social engineering vulnerabilities appeared first on TechRepublic.…
Cisco: Companies are spending on privacy protection, but do customers know it?
The 2023 Benchmark survey of security pros worldwide found that companies are taking action on customer privacy, but transparency is key. The post Cisco: Companies are spending on privacy protection, but do customers know it? appeared first on TechRepublic. This…
New virtual data fabric to support DoD cyber testing
As cybersecurity threats increase in complexity and volume, the Department of Defense is turning to new technologies for help. The post New virtual data fabric to support DoD cyber testing appeared first on TechRepublic. This article has been indexed from…
How IT jobs and recruiting on the dark web might trick you
A new Kaspersky report sheds light on why some tech pros look for jobs on the dark web and how to spot suspicious and likely illegal positions from recruiters in that environment. The post How IT jobs and recruiting on…
Personal data encryption in Windows 11
There’s a new, more secure way to encrypt files in Windows 11, but it’s only an option for building secure applications, not a replacement for BitLocker. The post Personal data encryption in Windows 11 appeared first on TechRepublic. This article…
C-suite execs expect cyberattacks targeting financial data to increase this year
The trend will carry from the past 12 months when more than a third of executives polled by Deloitte said that cyberattacks targeted their financial and accounting data. The post C-suite execs expect cyberattacks targeting financial data to increase this…
If your business needs cybersecurity, you should become the expert
One of the web’s biggest cybersecurity training resources, The Complete 2023 Cyber Security Developer & IT Skills Bundle, is now just $79. The post If your business needs cybersecurity, you should become the expert appeared first on TechRepublic. This article…
New cybersecurity data reveals persistent social engineering vulnerabilities
Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022. The post New cybersecurity data reveals persistent social engineering vulnerabilities appeared first on TechRepublic.…
Metaverse adds new dimensions to Web 3.0 cybersecurity
With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game will continue, but with more dimensions. The post Metaverse adds new dimensions to Web 3.0 cybersecurity appeared first on TechRepublic.…
Massive ransomware operation targets VMware ESXi: How to protect from this security threat
These ransomware infections on VMware ESXi software are due to a vulnerability that has existed since 2021. Find out the most targeted countries and how to secure your organization. The post Massive ransomware operation targets VMware ESXi: How to protect…
TrickGate crypter discovered after 6 years of infections
New research from Check Point Research exposes a crypter that stayed undetected for six years and is responsible for several major malware infections around the globe. The post TrickGate crypter discovered after 6 years of infections appeared first on TechRepublic.…
Study: Companies have upwards of 1,000 apps but only a third are integrated
A new study by Salesforce’s MuleSoft suggests more isn’t necessarily better if an organization’s applications are not playing well together. Unfortunately, more than 70% remain disconnected from one another and the core business. The post Study: Companies have upwards of…
Prilex POS malware evolves to block contactless transactions
A new version of the Prilex POS malware has found a novel way to steal your credit card information. The post Prilex POS malware evolves to block contactless transactions appeared first on TechRepublic. This article has been indexed from Security…
Lifetime VPNSecure subscriptions are now just $39.99
Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Lifetime VPNSecure…
The importance of data retention policies
A data retention policy is the first step in helping protect an organization’s data and avoid financial, civil, and criminal penalties that increasingly accompany poor data management practices. This article outlines what a data retention policy is and why it’s…
Auditing and logging policy
Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems,…
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download appeared first on TechRepublic. This article has been indexed…
The headache of changing passwords
Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: The…
OneNote documents spread malware in several countries
A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic. This article has…
New cybersecurity BEC attack mimics vendors
A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post New cybersecurity BEC attack mimics vendors appeared first on TechRepublic.…
Access management policy
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while…
Study: Companies have upwards of 1,000 apps but only a third are integrated
A new study by Salesforce’s MuleSoft suggests more isn’t necessarily better if an organization’s applications are not playing well together. Unfortunately, more than 70% remain disconnected from one another and the core business. The post Study: Companies have upwards of…
Prilex POS malware evolves to block contactless transactions
A new version of the Prilex POS malware has found a novel way to steal your credit card information. The post Prilex POS malware evolves to block contactless transactions appeared first on TechRepublic. This article has been indexed from Security…
Lifetime VPNSecure subscriptions are now just $39.99
Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Lifetime VPNSecure…
The headache of changing passwords
Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: The…
New cybersecurity BEC attack mimics vendors
A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post New cybersecurity BEC attack mimics vendors appeared first on TechRepublic.…
OneNote documents spread malware in several countries
A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic. This article has…
IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from TechRepublic Premium offers…
Zero-trust security: A cheat sheet (free PDF)
Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a once-safe device can’t be…
Zero trust security: A cheat sheet (free PDF)
Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a once-safe device can’t be…
CIOs hold greater organizational leadership status
Foundry’s study found the role has been significantly elevated because of the economy, and CIOs are recognized as strategic business partners by their LOB peers. The post CIOs hold greater organizational leadership status appeared first on TechRepublic. This article has…
Get nine ethical hacking courses for just $30
Learn some of today’s most popular attacks and how to mitigate them with The All-in-One Ethical Hacking & Penetration Testing Bundle. The post Get nine ethical hacking courses for just $30 appeared first on TechRepublic. This article has been indexed…
Unphishable mobile MFA through hardware keys
With Azure AD and FIDO security keys, you can make MFA more secure and avoid having to provision certificates on everyone’s phones. The post Unphishable mobile MFA through hardware keys appeared first on TechRepublic. This article has been indexed from…
FBI takes down Hive ransomware group
Working with international law enforcement, the FBI said it has seized control of the servers the Hive group uses to communicate with members. The post FBI takes down Hive ransomware group appeared first on TechRepublic. This article has been indexed…
How to use Microsoft KQL for SIEM insight
Microsoft’s cloud-hosted SIEM software comes with a suite of powerful analytics tools designed to read logs and find anomalies in the data haystack. The post How to use Microsoft KQL for SIEM insight appeared first on TechRepublic. This article has…
Here’s how IT budgets should fill cybersecurity moats in 2023
TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity — even if their budgets are tighter. The post Here’s how IT budgets should fill cybersecurity moats in 2023 appeared first…
Securing IoT with Microsoft Defender for IoT sensors
Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post Securing IoT with Microsoft Defender for IoT sensors appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…
How to force Portainer to use HTTPS and upload your SSL certificates for heightened security
If Portainer is your go-to GUI for Docker and Kubernetes, you should consider adding a bit of extra security to the deployment. The post How to force Portainer to use HTTPS and upload your SSL certificates for heightened security appeared…
Survey: Cybersecurity budgets aren’t matching cybersecurity challenges
A new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of organizations have the budget to meet current cybersecurity needs. The post Survey: Cybersecurity budgets aren’t matching cybersecurity challenges appeared first…
The risks of 5G security
Unless you’ve been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The post The risks of 5G security appeared first on TechRepublic. This article has been indexed from Security |…
Learn cutting-edge ethical hacking techniques for just $39.99
The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post Learn cutting-edge ethical hacking techniques for just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…
Recent rise in SEO poisoning attacks compromise brand reputations
A new research report from SentinelOne exposes a SEO poisoning attack campaign that hijacks brand names in paid search ads. The post Recent rise in SEO poisoning attacks compromise brand reputations appeared first on TechRepublic. This article has been indexed…
How hackers stole the personal data of 37 million T-Mobile customers
The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers. The post How hackers stole the personal data of 37 million T-Mobile…
10 cybersecurity predictions for tech leaders in 2023
From ransomware to third-party vendor security to software-defined perimeters, these cybersecurity topics should be on IT leaders’ radar. The post 10 cybersecurity predictions for tech leaders in 2023 appeared first on TechRepublic. This article has been indexed from Security |…
Companies slow to “mask up” with zero trust cybersecurity protocols
A new study by Gartner predicts that by 2026 just 10% of companies will have zero-trust protocols in place against cybersecurity exploits. The post Companies slow to “mask up” with zero trust cybersecurity protocols appeared first on TechRepublic. This article…
Get lifetime access to this feature-rich VPN for just $60
The Seed4.me VPN is now on sale for a limited time. The post Get lifetime access to this feature-rich VPN for just $60 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article:…
Data Privacy Week 2023: Virtual events and webinars to attend
The National Cybersecurity Alliance’s second annual Data Privacy Week is January 22-28, 2023. Learn how you can participate in virtual events. The post Data Privacy Week 2023: Virtual events and webinars to attend appeared first on TechRepublic. This article has…
Report: Cyberespionage threat actor exploits CVE-2022-42475 FortiOS vulnerability
A possible Chinese cyberespionage actor has exploited a FortiOS vulnerability to successfully compromise companies. The post Report: Cyberespionage threat actor exploits CVE-2022-42475 FortiOS vulnerability appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original…
Checklist: Securing Windows 10 systems
Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10…
Malware response checklist
Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is…
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download appeared first on TechRepublic. This article has been indexed…
Kaspersky releases 2023 predictions
A new report from Kaspersky details what their digital forensics and incident response teams predict as the main 2023 threats to corporations and government agencies. Learn more about it. The post Kaspersky releases 2023 predictions appeared first on TechRepublic. This…
Get lifetime access to this powerful backup tool for $59.99
This deal includes full licenses to Genie Timeline Pro 10 for three devices. The post Get lifetime access to this powerful backup tool for $59.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…
Dashlane vs 1Password: Which password manager should you use in 2023?
Compare the pros, cons and standout features of Dashlane and 1Password. Use our comparison guide to choose the best option for you in 2023. The post Dashlane vs 1Password: Which password manager should you use in 2023? appeared first on…
Bitwarden vs LastPass (2023): Which password manager is better for you?
Bitwarden vs Lastpass: Which password manager is safer to use in 2023? Use our comparison guide to find out which one is best for you. The post Bitwarden vs LastPass (2023): Which password manager is better for you? appeared first…
Secure your email with this top-rated backup service
Mail Backup X is the ultimate solution to protect your email from corruptions and crashes. The post Secure your email with this top-rated backup service appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…
IT email templates: Security alerts
All company communication needs may vary but certain standard template messages can come in handy for IT staff to keep employees up to date on “need to know” informational bulletins. These bulletins may be one-off or regularly scheduled communications to…
As a cybersecurity blade, ChatGPT can cut both ways
The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense. The post As a cybersecurity blade,…
Threat attackers can own your data in just two days
This report shows cybercriminals need only a couple days to access your full corporate network and exfiltrate its data. Read on to learn more. The post Threat attackers can own your data in just two days appeared first on TechRepublic.…
Rise of cloud-delivered malware poses key security challenges
The volume of cloud-based malware tripled in 2022 over the prior year, says Netskope, with 30% of the malicious downloads coming from Microsoft OneDrive. The post Rise of cloud-delivered malware poses key security challenges appeared first on TechRepublic. This article…
Get lifetime access to award-winning cybersecurity training for just $80
With a CyberTraining 365 Online Academy: Lifetime Subscription, you’ll learn to create and maintain effective, up-to-date security measures. The post Get lifetime access to award-winning cybersecurity training for just $80 appeared first on TechRepublic. This article has been indexed from…
SimSpace CEO brings dogfight mentality to terra firma for IT cybersecurity training
William “Hutch” Hutchison, founder and CEO of SimSpace, speaks with Karl Greenberg about the virtues of cyber ranges in training IT teams, and SimSpace’s own specialty: Digital-twin based ranges that the firm provides to NATO governments worldwide, including security teams…
Microsoft retracts its report on Mac ransomware
A publication from Microsoft that was taken down January 6 warns about four ransomware families affecting macOS devices. Much of the report closely resembles research published in July by Patrick Wardle. The post Microsoft retracts its report on Mac ransomware…
Explore information security with 97% off this huge course bundle
The training covers Docker, Splunk and AWS as you work toward CCSP certification. The post Explore information security with 97% off this huge course bundle appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…
BCDR Buyer’s Guide For MSPs
When a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and disaster recovery (BCDR) solution to restore data and operations quickly, without sacrificing margin. That means industry-leading recovery technology…
Business Continuity and Disaster Recovery Solutions Built For Managed Service Providers
Critical business data lives on servers, personal devices, and in the cloud. If any of that data is compromised or breached, companies are vulnerable to significant revenue loss and even failure. With 85% of MSPs reporting attacks against SMBs in…
SIRIS Business Continuity and Disaster Recovery
SIRIS is fundamentally different than traditional backup and recovery solutions. Utilizing a cloud-first approach, managed service providers (MSPs) can offer their clients an all-in-one solution that incorporates local backup and recovery with a secure, cloud-based repository and full disaster recovery…
Ransomware attacks are decreasing, but companies remain vulnerable
Only 25% of the organizations surveyed by Delinea were hit by ransomware attacks in 2022, but fewer companies are taking proactive steps to prevent such attacks. The post Ransomware attacks are decreasing, but companies remain vulnerable appeared first on TechRepublic.…
Security risk assessment checklist
Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are under attack. Worse, neither an organization nor its managers need to prove prominent or controversial to prove…
Recent 2022 cyberattacks presage a rocky 2023
A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats. The post Recent 2022 cyberattacks presage a…
How to configure an SMTP server in a self-hosted instance Passbolt
With the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration features. Learn how to do it. The post How to configure an SMTP server in a self-hosted instance Passbolt appeared first on TechRepublic. This…
Cloud email services bolster encryption against hackers
Google, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector attacks from the first half of 2022. The post Cloud email services bolster encryption against hackers appeared first on TechRepublic.…
Meta violates GDPR with non-compliant targeted ad practices, earns over $400 million in fines
Meta has violated GDPR with illegal personal data collection practices for targeted ads. Learn about this latest violation and Meta’s rocky GDPR history. The post Meta violates GDPR with non-compliant targeted ad practices, earns over $400 million in fines appeared…
Machine-Learning Python package compromised in supply chain attack
A nightly build version of a machine-learning framework dependency has been compromised. The package ran malicious code on affected systems and stole data from unsuspecting users. The post Machine-Learning Python package compromised in supply chain attack appeared first on TechRepublic.…
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download appeared first on TechRepublic. This article has been indexed…