Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

court

SCOTUS Limits Scope of Cybersecurity Law

The U.S. Supreme Court recently issued a ruling interpreting the scope of the Computer Fraud and Abuse Act (CFAA), a 1986 federal statute that imposes civil and criminal liability for unauthorized computer access. In short, the Court decided that as long as an individual is authorized to access a computer and data, he doesn’t violate […]

work from home

Study: COVID Shift to Remote Work Led 80% of Organizations to Boost Focus on Identity Security

The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies, has released a study titled, “2021 Trends in Securing Digital Identities,” based on an online survey of over 500 IT decision makers. The report examines the impact that the […]

National Lab’s ‘Shadow Figment’ Tech Foils Cyberattacks

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such […]

remote worker

Businesses Need to Prioritize Cybersecurity for Their Remote Workers

Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]

Best Practices for Data Breach Detection, Response

It’s not a matter of who will be affected by a data breach but when. The COVID-19 pandemic has awakened a Pandora’s box of data predators. For a company, the breaches can be costly, both financially and in other ways, including the devastating toll they can take on your reputation. Many breaches occur because of […]

Man in office using personal devices for work.

BYOD Security Risks

We’ve talked before about the reasons an employer may benefit from implementing a bring-your-own-device (BYOD) policy in the workplace, such as cost reduction, improved employee satisfaction, the likelihood of better technology standards, and the decreased time to productivity on a personal device, just to name a few. But there are quite a few security risks, […]

Pipeline Cyberattack Results in FMCSA Issuing HOS Exemption

On May 9, the Federal Motor Carrier Safety Administration (FMCSA) issued a temporary exemption for commercial motor vehicles (CMVs) from hours of service (HOS) regulations to ensure adequate fuel supplies in several East Coast states following a cyberattack on the Colonial Pipeline.

Cybersecurity Credential Stuffing

The Evolution of Cybersecurity

World Backup Day was this past Wednesday. It’s a day dedicated to highlighting the value of good cybersecurity practices, like protecting your vital information by backing up all critical files, and locking them away from scam artists and hackers. That has never been more important than it is now. Last year, we saw cybercriminals seizing […]