Businesses hobbled by deficiencies in security resourcing as IoT-driven DDoS volumes surge
Targeted attacks have made DDoS attacks part of everyday life – but businesses aren’t ready
David Braue | 25 Jan | Read more
Targeted attacks have made DDoS attacks part of everyday life – but businesses aren’t ready
David Braue | 25 Jan | Read more
Lawmakers have been warned that cyber attacks are going to get physical and if they want to have a decent answer when things do go wrong, they’ll need to make laws that force manufacturers to build secure products.
Security's profile may be increasing overall, but transformation-minded executives across Australia and New Zealand have shown scant attention to the area in a survey that put security nearly at the bottom of their list of priorities during digital-transformation efforts.
David Braue | 19 Sep | Read more
Growing enterprise usage of cloud-based file-sharing tools has driven Dropbox to increase the granularity of its access controls and develop a new administration schema upon which additional security features will progressively be rolled out to the company's more than 11,000 Australian and 200,000 worldwide business customers.
David Braue | 01 Aug | Read more
Despite growing recognition of their importance in mounting an effective cybersecurity defence, industry research has suggested that fully one-third of CEOs and 43 percent of management teams are not regularly briefed on cybersecurity.
David Braue | 14 Dec | Read more
It's all too easy to neglect data security, especially for a small business. While bigger organizations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security functionality.
Alex Castle | 18 Jan | Read more
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in the security chain.
Tony Bradley | 01 Jul | Read more
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
The glorious chaos we call the Holiday Shopping Season will soon be upon us. Holiday shopping also means a spike in online scams, fraud, and malware, so you need to be aware of the risks and threats, and exercise some common sense to avoid a cyber-Grinch incident.
Tony Bradley | 21 Nov | Read more
Like all law enforcement agencies, the Suffolk County Police Department needed to provide its field officers – intelligence officers in particular – with quick, seamless access to its central database through a VPN connection. For such officers, the ability to quickly obtain information on a suspect or developing situation can be the difference between a successful arrest and a failed one, or even between life and death. Therein lay the problem: in order to comply with strict IT security regulations, any device that connects to a police database must use two-factor authentication; a username and password simply aren’t enough.