To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.
Active shooter technology has become a valuable tool that many security professionals are giving more consideration to, in light of the gun violence tragedies we see in our society on a regular basis. It’s important for security, facilities and IT directors to become familiar with active shooter technology to fully understand how it can be deployed, and how it benefits their company, employees and assets.
For business owners and property managers, public building security remains a universal challenge: How do you ensure the security of your staff and customers during hours of operation and protect your assets once regular business hours end? The conundrum that is security and safety in public spaces seems eternal, and the violence that fuels today’s headlines only exacerbates the urgency to find solutions to securing common building entrances.
When an incident or disaster occurs, security and fraud investigators go to work. They must be able to rely on innovative processes and tools that allow them to swiftly locate and analyze the information needed to determine the proper resolution or action. Credit unions need intuitive solutions that can be leveraged across multiple departments in a moment's notice to be more efficient and effective in today’s challenging environment.
The massive, overnight shift to a fully remote work environment during the COVID-19 crisis has amplified both the urgency and the obstacles around endpoint security. Not only were many machines not designed to work outside the corporate environment, leaving many companies woefully unprepared, but cybercriminals have already sprung to the occasion, preying on COVID-19 fears.
Like many other industry buzzwords, there’s a lot of hype around security automation. Yet, for the first line of defense in an enterprise environment, the analysts working in the security operations center (SOC), the notion of automation is more headline than reality. Many basic tasks – logging, fault isolation, reporting, and incident troubleshooting – are still very much manual.
Ten years ago, I helped create a national pandemic plan outlining how the U.K. would respond to a potential outbreak. While the exercise was largely theoretical, we are now seeing the need for these preparations in real time. Here are four key lessons from my time preparing for a pandemic.
The best way to protect accounts and data from credential stuffing and online phishing attacks is to stop reusing the same passwords on multiple accounts. All accounts—but especially accounts related to work, retail, finance, and government—should be protected with strong, unique passwords. What are a few best practices to ensure employees are safer online?
Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to evolve.