Trustwave Report: Malware Continues to Exploit Unsecured Vendor Access

Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.

Source: 2017 Trustwave Global Security Report

The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on

Recovering from the PetyaWrap Ransomware Attack & Preparing for Whatever’s Next

As the saying goes, “Fool me once…”

Businesses that fail to secure their networks from known exploits will continue to be targeted by malware attacks. Yesterday, those who didn’t learn this lesson during the recent WannaCry fiasco got a malicious reminder to regularly update network security and patch their OS.… Read on

Yes, the GDPR Applies to your Company

Companies Aren’t Ready for the GDPR

During a recent group webinar with infosecurity-magazine.com (you can watch the full recording of that here), we asked 200 IT professionals to rate their organizations’ preparedness for GDPR. These were their responses:

  • 17% – Very prepared
  • 13% – Almost ready
  • 40% – We’ve got a long way to go
  • 30% – I don’t think we’ve done a thing

With less than a year before it takes effect, 70% of organizations surveyed are not even close to being ready for the GDPR.… Read on

Remote Access and GDPR: A Compliance Odyssey – Part 1

With the release of the updated General Data Protection Regulation, its impact on remote control software has been on my mind a lot recently. If the topic of remote control and data protection doesn’t ring your bell, I understand. Unless you are a member of the help desk crowd, you probably don’t share my interest in remote control software.… Read on

[INFOGRAPHIC] NETWORK SECURITY: PREPARE FOR HUMAN ERROR

Are user credentials sufficient for secure authentication? 

No. The use of user credentials (username and password) by itself presents a high risk of unauthorized access and is no longer a viable option for secure authentication.

Is two-factor authentication the solution?Read on