Each week we scour the web to discover the latest developments, news and tips that will help you keep your technology (and your business) safe and secure.
Here are the most interesting articles we’ve found this week that could be helpful to you:
Advent tip #24: The Big One! |
The Sophos Security Blog put together a great list of cyber security tips and published it in December. Here are a bunch of simple, but really important security tips to use your technology responsibly.
Did you know that six out of the top ten pieces of software with the the most vulnerabilities of 2015 are in regular use by small- and medium-sized businesses across the country? They are. Read this article to see if you use these vulnerable tools (and how to use them safely).
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.
The Employee Password Habits That Could Hurt Enterprises
If your employees use weak passwords, they can hurt your company. Quality passwords are one of easiest safeguards that your company can make to improve your threat surface area. Read more about it in this article.
Inside an SMB Hack | Breach Secure Now!
This research conclusively shows that security breaches are more likely to happen in small and medium businesses.
In a Verizon Data Breach Investigations Study, they found that 71% of breaches occurred in businesses with less than 100 employees. You would think that Small to Midsize Businesses (SMBs) would be very worried about security. And many SMBs might be worried but for the majority they just don’t believe that they need to worry or that they could be a victim.
Information Security Testing Continuum – Cybersecurity Defense Solutions
Great blog post that illustrates the increasing levels of a cyber security plan.
There are a lot of companies out there who will sell you anything they can, even when your business is not ready for it. These companies are not doing our industry or your business any favors by selling assessments and tests that your business will in the end see little value in. We will try and shed some light on this for the average business owner/IT Manager.
Ransom32 Is a JavaScript-Based Ransomware That Uses Node.js to Infect Users
New threat incoming. Ransomware authors continue to innovate. This particular version is cross platform and spread by phishing emails.
Ransom32 is currently distributed only via spam email campaigns. This is a classic method of distributing any type of malware, not just ransomware, and is not unique to Ransom32.
Just in case you missed it, cloud providers are going to notify users of government request for information. Microsoft finally joins the pack.
Microsoft this week announced that it, too, would alert users when they are beset by state-sponsored cyber attacks, following the lead of Google, Facebook and, most recently, Yahoo.