Is it truly possible to train every single employee—including those working from home and organizations’ third-party partners—to spot a cyber-threat? Or to keep good cybersecurity hygiene when handling sensitive data? Or to refrain from stealing intellectual property when they’re disgruntled and about to resign? While training is a key element to preventing breaches and protecting important corporate data, training alone is not enough.
CMOs are now tasked with introducing privacy-centric practices to protect consumer data, while simultaneously using this data to personalize experiences. Here are three ways privacy will need to evolve organization-wide as demand for personalized "everything" grows.
In late January, the Department of Justice filed lawsuits seeking temporary restraining orders against five companies and three individuals, based on allegations that they had carried hundreds of millions of fraudulent robocalls to American consumers. Within days, the Federal Trade Commission (FTC) sent letters to 19 Voice over Internet Protocol providers to warn them that any assistance or facilitation of telemarketing through robocalls would be deemed to violate the new law.
While increasingly common even before the coronavirus, remote work brings its own unique set of cybersecurity challenges. Here are the ten most common pitfalls and the recommended solutions.
It may well be that the primary reason that security officers have historically struggled to achieve high levels of organizational and vocational relevance and performance is based solely on their generalized lack of health, wellness and physical fitness.
As companies find themselves suddenly shifting to remote work due to the COVID-19 (coronavirus) outbreak, many employees are working from home for the first time. While not ideal from a security standpoint, there are simple steps you, and your employer, can quickly take to better secure your new working environment.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
How can the modern office environment improve their operational strategy to help bolster the security of data and help employees brush up on better cybersecurity strategies? One primary method that is simple and often overlooked is two-factor authentication.