How are threat actors so successful? They gather breached data and information from open sources – think social media profiles or even voting records – to build digital profiles of individuals with just a few clicks. This can then lead to, among other attacks, phishing scams such as business email compromise, potentially inflicting a significant financial toll on an organization.
Much like the long-standing debate around 5G, President Trump’s recent decision to sign an executive order that may see TikTok and WeChat banned, and has now evolved into a bidding war for TikTok’s U.S. operations with Oracle leading as the potential winner, has brought the world’s attention to the inherent security challenges that complex global digital communications and connectivity present.
Criminals are leveraging elevated interest in COVID-19 to send emails to unsuspecting people to infect computers with ransomware, malware or other computer viruses. And why not? According to Forbes, the COVID-19 crisis has turned the U.S. workforce into a work-from-home army, giving cybercriminals new, less secure, access points for cyber viruses and phishing attacks, revealing vulnerabilities in cybersecurity strategies for the coronavirus crisis. And since there’s a tremendous curiosity for coronavirus information — people are more likely to click without checking the credibility of the source.
Here, we talk to Julian Waits, General Manager of Cybersecurity at Business Unit at Devo, to find out how security operations center (SOC) leaders can create a culture of growth among their teams.
One thing has become clear; to abide by the “new normal” restrictions, organizations need to be constantly aware of their environments’ compliance, in real-time. To do that, they need to improve their security and situational awareness, so they can quickly assess evolving situations and respond when violations occur.
With the emergence and continuation of the pandemic, organizations are looking for viable answers to help mitigate the immersion of remote working structures by providing real solutions that will allow organizations to get their hospitals, workforce, manufacturing and educational environments back to some sense of normal.
Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. The GNA, as well as their border force colleagues in neighboring countries, must also grapple with cross-border crime that take advantage of the close ties among the region’s economies. According to Interpol, illicit markets in these border regions may be worth tens of billions of dollars.
Today, as an increasing number of organizations, including top tech companies like Google, Twitter and Facebook, have announced extended remote work plans, IT teams must ensure employee devices are secured to sustain the long haul. With IT burnout high, user awareness low, and malicious activity rising, this is often easier said than done. Here are top three tips for IT teams to ensure employee devices remain secure as remote work looms.
Security personnel are seeing their roles expand as they assist companies and communities in combating COVID-19. They are performing temperature screening, monitoring personal protective equipment (PPE) usage and physical distancing, managing building occupancy, controlling line-ups, and even assisting with contact tracing. To support new needs, and keep employees safe at the same time, security companies have instituted new training programs and methods given these changing conditions.
In the security industry, technology is moving at lightspeed. New devices, automation, custom software, and robot and drone technology is constantly being developed, improved upon, and employed to help security guards perform routine tasks. However, to reap the benefits of rapid development and deliver exceptional results, the security industry needs to embrace all of these technological changes and be able to spot trends in order to protect an organization's data and to ensure the safety and wellbeing of its security workforce.