The U.S. Supreme Court recently issued a ruling interpreting the scope of the Computer Fraud and Abuse Act (CFAA), a 1986 federal statute that imposes civil and criminal liability for unauthorized computer access. In short, the Court decided that as long as an individual is authorized to access a computer and data, he doesn’t violate […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies, has released a study titled, “2021 Trends in Securing Digital Identities,” based on an online survey of over 500 IT decision makers. The report examines the impact that the […]
Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such […]
Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]
It’s not a matter of who will be affected by a data breach but when. The COVID-19 pandemic has awakened a Pandora’s box of data predators. For a company, the breaches can be costly, both financially and in other ways, including the devastating toll they can take on your reputation. Many breaches occur because of […]
We’ve talked before about the reasons an employer may benefit from implementing a bring-your-own-device (BYOD) policy in the workplace, such as cost reduction, improved employee satisfaction, the likelihood of better technology standards, and the decreased time to productivity on a personal device, just to name a few. But there are quite a few security risks, […]
On May 9, the Federal Motor Carrier Safety Administration (FMCSA) issued a temporary exemption for commercial motor vehicles (CMVs) from hours of service (HOS) regulations to ensure adequate fuel supplies in several East Coast states following a cyberattack on the Colonial Pipeline.
World Backup Day was this past Wednesday. It’s a day dedicated to highlighting the value of good cybersecurity practices, like protecting your vital information by backing up all critical files, and locking them away from scam artists and hackers. That has never been more important than it is now. Last year, we saw cybercriminals seizing […]
Whether you’ve outsourced your IT infrastructure to an outside party or have a trusted in-house team to handle your data and cybersecurity, a data backup strategy should be a non-negotiable part of the equation.
The modern technological era is one where organizations are continuously threatened by online hackers. These threat actors have become more intelligent, and by using a combination of new tools, old tricks, and perseverance, they remain adept at breaking through increasingly secure endpoints.