In late January, the Department of Justice filed lawsuits seeking temporary restraining orders against five companies and three individuals, based on allegations that they had carried hundreds of millions of fraudulent robocalls to American consumers. Within days, the Federal Trade Commission (FTC) sent letters to 19 Voice over Internet Protocol providers to warn them that any assistance or facilitation of telemarketing through robocalls would be deemed to violate the new law.
As companies find themselves suddenly shifting to remote work due to the COVID-19 (coronavirus) outbreak, many employees are working from home for the first time. While not ideal from a security standpoint, there are simple steps you, and your employer, can quickly take to better secure your new working environment.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
How can the modern office environment improve their operational strategy to help bolster the security of data and help employees brush up on better cybersecurity strategies? One primary method that is simple and often overlooked is two-factor authentication.
Recent data breach incidents that expose personally identifiable information and biometrics highlight the lack of proper authentication and storage protocols. Organizations need to implement effective storage-based strategies to protect the biometric data collected as a result of authentication. Why is data encryption the solution?
During this COVID-19 crisis, law enforcement and security personnel are not only expected to continue their usual levels of service to the public, but are also expected to assist in community and government efforts combatting the virus. It is important that law enforcement and security officers are aware of the following information: Recognition, Protection, Personal Protection Equipment (PPE) and how to Respond if Exposed.
While the overall impact of the coronavirus is still in question, organizations can mitigate the damage it may cause by using mass notification stay in contact with their employees to keep them informed about any changes or developments.
Continuous evaluation can pick up and make note of concerning behaviors among employees, giving an employer the ability to intervene in negative behaviors that take place after the initial background check and before something serious happens to the individual or their organization. Once alerted to concerning employee behavior, employers can unlock multiple organizational support mechanisms, including having HR speak to the individual about the potential cause.
Limiting the spread and collateral damage that COVID-19 poses to the world will heavily depend on the level of situational awareness of the people on the ground and their reaction speed. What are some incident management protocols security leaders should keep in mind during COVID-19?